@@ -540,7 +540,7 @@ ioctl is useful if the in-kernel PIC is not used.
540540PPC:
541541^^^^
542542
543- Queues an external interrupt to be injected. This ioctl is overleaded
543+ Queues an external interrupt to be injected. This ioctl is overloaded
544544with 3 different irq values:
545545
546546a) KVM_INTERRUPT_SET
@@ -965,7 +965,7 @@ be set in the flags field of this ioctl:
965965The KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL flag requests KVM to generate
966966the contents of the hypercall page automatically; hypercalls will be
967967intercepted and passed to userspace through KVM_EXIT_XEN. In this
968- ase , all of the blob size and address fields must be zero.
968+ case , all of the blob size and address fields must be zero.
969969
970970The KVM_XEN_HVM_CONFIG_EVTCHN_SEND flag indicates to KVM that userspace
971971will always use the KVM_XEN_HVM_EVTCHN_SEND ioctl to deliver event
@@ -1070,7 +1070,7 @@ Other flags returned by ``KVM_GET_CLOCK`` are accepted but ignored.
10701070:Extended by: KVM_CAP_INTR_SHADOW
10711071:Architectures: x86, arm64
10721072:Type: vcpu ioctl
1073- :Parameters: struct kvm_vcpu_event (out)
1073+ :Parameters: struct kvm_vcpu_events (out)
10741074:Returns: 0 on success, -1 on error
10751075
10761076X86:
@@ -1193,7 +1193,7 @@ directly to the virtual CPU).
11931193:Extended by: KVM_CAP_INTR_SHADOW
11941194:Architectures: x86, arm64
11951195:Type: vcpu ioctl
1196- :Parameters: struct kvm_vcpu_event (in)
1196+ :Parameters: struct kvm_vcpu_events (in)
11971197:Returns: 0 on success, -1 on error
11981198
11991199X86:
@@ -3063,7 +3063,7 @@ as follow::
30633063 };
30643064
30653065An entry with a "page_shift" of 0 is unused. Because the array is
3066- organized in increasing order, a lookup can stop when encoutering
3066+ organized in increasing order, a lookup can stop when encountering
30673067such an entry.
30683068
30693069The "slb_enc" field provides the encoding to use in the SLB for the
@@ -3455,7 +3455,7 @@ Possible features:
34553455 - KVM_RUN and KVM_GET_REG_LIST are not available;
34563456
34573457 - KVM_GET_ONE_REG and KVM_SET_ONE_REG cannot be used to access
3458- the scalable archietctural SVE registers
3458+ the scalable architectural SVE registers
34593459 KVM_REG_ARM64_SVE_ZREG(), KVM_REG_ARM64_SVE_PREG() or
34603460 KVM_REG_ARM64_SVE_FFR;
34613461
@@ -4401,7 +4401,7 @@ This will have undefined effects on the guest if it has not already
44014401placed itself in a quiescent state where no vcpu will make MMU enabled
44024402memory accesses.
44034403
4404- On succsful completion, the pending HPT will become the guest's active
4404+ On successful completion, the pending HPT will become the guest's active
44054405HPT and the previous HPT will be discarded.
44064406
44074407On failure, the guest will still be operating on its previous HPT.
@@ -5016,7 +5016,7 @@ before the vcpu is fully usable.
50165016
50175017Between KVM_ARM_VCPU_INIT and KVM_ARM_VCPU_FINALIZE, the feature may be
50185018configured by use of ioctls such as KVM_SET_ONE_REG. The exact configuration
5019- that should be performaned and how to do it are feature-dependent.
5019+ that should be performed and how to do it are feature-dependent.
50205020
50215021Other calls that depend on a particular feature being finalized, such as
50225022KVM_RUN, KVM_GET_REG_LIST, KVM_GET_ONE_REG and KVM_SET_ONE_REG, will fail with
@@ -5475,7 +5475,7 @@ KVM_XEN_ATTR_TYPE_EVTCHN
54755475 from the guest. A given sending port number may be directed back to
54765476 a specified vCPU (by APIC ID) / port / priority on the guest, or to
54775477 trigger events on an eventfd. The vCPU and priority can be changed
5478- by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but but other
5478+ by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but other
54795479 fields cannot change for a given sending port. A port mapping is
54805480 removed by using KVM_XEN_EVTCHN_DEASSIGN in the flags field. Passing
54815481 KVM_XEN_EVTCHN_RESET in the flags field removes all interception of
0 commit comments