@@ -540,7 +540,7 @@ ioctl is useful if the in-kernel PIC is not used.
540
540
PPC:
541
541
^^^^
542
542
543
- Queues an external interrupt to be injected. This ioctl is overleaded
543
+ Queues an external interrupt to be injected. This ioctl is overloaded
544
544
with 3 different irq values:
545
545
546
546
a) KVM_INTERRUPT_SET
@@ -965,7 +965,7 @@ be set in the flags field of this ioctl:
965
965
The KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL flag requests KVM to generate
966
966
the contents of the hypercall page automatically; hypercalls will be
967
967
intercepted and passed to userspace through KVM_EXIT_XEN. In this
968
- ase , all of the blob size and address fields must be zero.
968
+ case , all of the blob size and address fields must be zero.
969
969
970
970
The KVM_XEN_HVM_CONFIG_EVTCHN_SEND flag indicates to KVM that userspace
971
971
will always use the KVM_XEN_HVM_EVTCHN_SEND ioctl to deliver event
@@ -1070,7 +1070,7 @@ Other flags returned by ``KVM_GET_CLOCK`` are accepted but ignored.
1070
1070
:Extended by: KVM_CAP_INTR_SHADOW
1071
1071
:Architectures: x86, arm64
1072
1072
:Type: vcpu ioctl
1073
- :Parameters: struct kvm_vcpu_event (out)
1073
+ :Parameters: struct kvm_vcpu_events (out)
1074
1074
:Returns: 0 on success, -1 on error
1075
1075
1076
1076
X86:
@@ -1193,7 +1193,7 @@ directly to the virtual CPU).
1193
1193
:Extended by: KVM_CAP_INTR_SHADOW
1194
1194
:Architectures: x86, arm64
1195
1195
:Type: vcpu ioctl
1196
- :Parameters: struct kvm_vcpu_event (in)
1196
+ :Parameters: struct kvm_vcpu_events (in)
1197
1197
:Returns: 0 on success, -1 on error
1198
1198
1199
1199
X86:
@@ -3063,7 +3063,7 @@ as follow::
3063
3063
};
3064
3064
3065
3065
An entry with a "page_shift" of 0 is unused. Because the array is
3066
- organized in increasing order, a lookup can stop when encoutering
3066
+ organized in increasing order, a lookup can stop when encountering
3067
3067
such an entry.
3068
3068
3069
3069
The "slb_enc" field provides the encoding to use in the SLB for the
@@ -3455,7 +3455,7 @@ Possible features:
3455
3455
- KVM_RUN and KVM_GET_REG_LIST are not available;
3456
3456
3457
3457
- KVM_GET_ONE_REG and KVM_SET_ONE_REG cannot be used to access
3458
- the scalable archietctural SVE registers
3458
+ the scalable architectural SVE registers
3459
3459
KVM_REG_ARM64_SVE_ZREG(), KVM_REG_ARM64_SVE_PREG() or
3460
3460
KVM_REG_ARM64_SVE_FFR;
3461
3461
@@ -4401,7 +4401,7 @@ This will have undefined effects on the guest if it has not already
4401
4401
placed itself in a quiescent state where no vcpu will make MMU enabled
4402
4402
memory accesses.
4403
4403
4404
- On succsful completion, the pending HPT will become the guest's active
4404
+ On successful completion, the pending HPT will become the guest's active
4405
4405
HPT and the previous HPT will be discarded.
4406
4406
4407
4407
On failure, the guest will still be operating on its previous HPT.
@@ -5016,7 +5016,7 @@ before the vcpu is fully usable.
5016
5016
5017
5017
Between KVM_ARM_VCPU_INIT and KVM_ARM_VCPU_FINALIZE, the feature may be
5018
5018
configured by use of ioctls such as KVM_SET_ONE_REG. The exact configuration
5019
- that should be performaned and how to do it are feature-dependent.
5019
+ that should be performed and how to do it are feature-dependent.
5020
5020
5021
5021
Other calls that depend on a particular feature being finalized, such as
5022
5022
KVM_RUN, KVM_GET_REG_LIST, KVM_GET_ONE_REG and KVM_SET_ONE_REG, will fail with
@@ -5475,7 +5475,7 @@ KVM_XEN_ATTR_TYPE_EVTCHN
5475
5475
from the guest. A given sending port number may be directed back to
5476
5476
a specified vCPU (by APIC ID) / port / priority on the guest, or to
5477
5477
trigger events on an eventfd. The vCPU and priority can be changed
5478
- by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but but other
5478
+ by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but other
5479
5479
fields cannot change for a given sending port. A port mapping is
5480
5480
removed by using KVM_XEN_EVTCHN_DEASSIGN in the flags field. Passing
5481
5481
KVM_XEN_EVTCHN_RESET in the flags field removes all interception of
0 commit comments