From nobody Thu Nov 14 18:13:18 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=linaro.org ARC-Seal: i=1; a=rsa-sha256; t=1708419204; cv=none; d=zohomail.com; s=zohoarc; b=iVYeBoLwC+aohtcbiCQ8qqYYlrWmJbL5zY0e6ygirK7hpoSgnYffEaG0VSpzYSV5BZRr1JtuV6AG01WMxu/FZ6/6fXxlfiHfQFc0xAgQiUBk1fMoekjshYTAMK3B4cjfpuAKwc5DIyWM6S/J/qOo0OjFITRAqPzPnbRjH24feOo= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1708419204; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=74P+PKZ6orTLj/5plkkdrxWuHnGI5wedPF2+fgfkjP0=; b=nkhPzlNX8g6znLHnJB5WzzEZiiO+Uzd3GLhg2nBgUan91qX6zs327lyf3nHkhShwmlH8VeFBrPmilfuo03RDvrMGiUFMZz2j8ZRvkvgm/2Mo3YqRugOajZf0bKKAOPVf9YQXiTzDT6N49YP4cZf+kw2jQJDKaOEQ/vLG4LHiz7E= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1708419204729329.0235065920592; Tue, 20 Feb 2024 00:53:24 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.683264.1062718 (Exim 4.92) (envelope-from ) id 1rcLsH-0002ve-CH; Tue, 20 Feb 2024 08:53:13 +0000 Received: by outflank-mailman (output) from mailman id 683264.1062718; Tue, 20 Feb 2024 08:53:13 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1rcLsH-0002vV-7g; Tue, 20 Feb 2024 08:53:13 +0000 Received: by outflank-mailman (input) for mailman id 683264; Tue, 20 Feb 2024 08:53:11 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1rcLsF-0002dz-GK for xen-devel@lists.xenproject.org; Tue, 20 Feb 2024 08:53:11 +0000 Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com [2a00:1450:4864:20::633]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 7959e3ec-cfcd-11ee-8a52-1f161083a0e0; Tue, 20 Feb 2024 09:53:10 +0100 (CET) Received: by mail-ej1-x633.google.com with SMTP id a640c23a62f3a-a3e8c1e4aa7so194147066b.2 for ; Tue, 20 Feb 2024 00:53:10 -0800 (PST) Received: from localhost.localdomain (adsl-245.37.6.163.tellas.gr. [37.6.163.245]) by smtp.gmail.com with ESMTPSA id cu3-20020a170906ba8300b00a3d014fa12esm3747876ejd.196.2024.02.20.00.53.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 20 Feb 2024 00:53:10 -0800 (PST) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 7959e3ec-cfcd-11ee-8a52-1f161083a0e0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1708419190; x=1709023990; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=74P+PKZ6orTLj/5plkkdrxWuHnGI5wedPF2+fgfkjP0=; b=Wy2Zd/LcuH+3l8id/j9RzCXBT3y4P0QzKrhPQ3jsLvYKL5NM7v74NgOJ+tyq2ONb0V NTcfTwS5A2Kd1yOxY8L8KDNyUrFrDv+0WzNenc5F6e42yXuA/tH2jZryHP3M+Yebzp8l Qd12qScioQ87FOmZtY6fLQi1FM0rwbRoqlj754Y8ESvFKPYlrr9wqhGB79dijbsRmzKk +aJ3mawLZskCs+oa5jwUQUH11A5pfrHfHU0Y2e8r6RaY6nB1TWzTdZhkl8Glgj/3Q6EN HKtZkZpn1Qp+YsWJYHBGCAiD+sGzoJi7XO9faLfclIqhy0ei0trB9PJ5VNcR98fgBw0H frag== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708419190; x=1709023990; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=74P+PKZ6orTLj/5plkkdrxWuHnGI5wedPF2+fgfkjP0=; b=XTIQenuEf85xei1cIa2bz+L2fq9OprFu1JhNOlgGQ9yUqBRgLX42xiKqYbqMrOrc+z FjUvFsZexwalEmtBYG6VgIj4AQHRJhfRQtD+EbJsUaOQz+4znaWJgxJ2efRSFWrd6eLF UXMNPawYZzB1UoE8WH/YJt4atA8XsWnxNsLhKxc7Qz63qu6OArDOnt98nRHz8OgbSLtg EdCStW3yii0dG6kagz8FzvBpl850IMNjDIJN1zsfsxgcB5RYsuNbFCXlxgwWRXaxTS7q ArysrVj1Py1py5lRVf6srBjlGkF5h+4EdRNwjjH1sOohIteI+5Tp9bF9gmuWX1Nhh04v V4pg== X-Forwarded-Encrypted: i=1; AJvYcCVXJS8X0Bv4W43tVq2ZY2jdoHnHoQe7zSffnD2G2rIsuA96duDgJ3V/BqV95dA9ESbFc/+Q7xFALKLjjkdL+RK5BFoXYN9fhPJZLmb0yEc= X-Gm-Message-State: AOJu0YxVl4kQElLKjY5KLEevY5AKxxG2gQhkMdpmnQWzhkOaSxslg2dN CNBUfobRyOWAVfj98VWxfozNT5t/bx0Lkl4CHF9l4jIwYN07bksadxb8FZvlfmk= X-Google-Smtp-Source: AGHT+IH0/5iDtgDsLwpGN/YmUhRGA55XSWPIdNMzHkhCmG1fsWPv29/an+50Zc6oVwnQznVwV1dJEg== X-Received: by 2002:a17:906:57ca:b0:a3f:ce8:1234 with SMTP id u10-20020a17090657ca00b00a3f0ce81234mr403891ejr.68.1708419190280; Tue, 20 Feb 2024 00:53:10 -0800 (PST) From: Manos Pitsidianakis To: qemu-trivial@nongnu.org Cc: qemu-devel@nongnu.org, Michael Tokarev , Stefano Stabellini , Anthony Perard , Paul Durrant , xen-devel@lists.xenproject.org Subject: [PATCH v1 03/21] Xen headers: correct typos Date: Tue, 20 Feb 2024 10:52:10 +0200 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @linaro.org) X-ZM-MESSAGEID: 1708419205445100005 Content-Type: text/plain; charset="utf-8" Correct typos automatically found with the `typos` tool Signed-off-by: Manos Pitsidianakis --- include/hw/xen/interface/arch-x86/xen-x86_64.h | 2 +- include/hw/xen/interface/arch-x86/xen.h | 2 +- include/hw/xen/interface/event_channel.h | 2 +- include/hw/xen/interface/grant_table.h | 2 +- include/hw/xen/interface/hvm/hvm_op.h | 2 +- include/hw/xen/interface/io/blkif.h | 4 ++-- include/hw/xen/interface/io/fbif.h | 2 +- include/hw/xen/interface/io/kbdif.h | 2 +- include/hw/xen/interface/io/ring.h | 2 +- include/hw/xen/interface/memory.h | 2 +- include/hw/xen/interface/physdev.h | 4 ++-- include/hw/xen/interface/xen.h | 4 ++-- 12 files changed, 15 insertions(+), 15 deletions(-) diff --git a/include/hw/xen/interface/arch-x86/xen-x86_64.h b/include/hw/xe= n/interface/arch-x86/xen-x86_64.h index 5d9035ed22..3e94eeb0bf 100644 --- a/include/hw/xen/interface/arch-x86/xen-x86_64.h +++ b/include/hw/xen/interface/arch-x86/xen-x86_64.h @@ -89,7 +89,7 @@ * RING1 -> RING3 kernel mode. * RING2 -> RING3 kernel mode. * RING3 -> RING3 user mode. - * However RING0 indicates that the guest kernel should return to iteself + * However RING0 indicates that the guest kernel should return to itself * directly with * orb $3,1*8(%rsp) * iretq diff --git a/include/hw/xen/interface/arch-x86/xen.h b/include/hw/xen/inter= face/arch-x86/xen.h index c0f4551247..323bd06a63 100644 --- a/include/hw/xen/interface/arch-x86/xen.h +++ b/include/hw/xen/interface/arch-x86/xen.h @@ -156,7 +156,7 @@ typedef uint64_t tsc_timestamp_t; /* RDTSC timestamp */ * information in this structure is updated, the fields read include: fpu_= ctxt * (if VGCT_I387_VALID is set), flags, user_regs and debugreg[*]. * - * Note: VCPUOP_initialise for HVM guests is non-symetric with + * Note: VCPUOP_initialise for HVM guests is non-symmetric with * DOMCTL_setvcpucontext, and uses struct vcpu_hvm_context from hvm/hvm_vc= pu.h */ struct vcpu_guest_context { diff --git a/include/hw/xen/interface/event_channel.h b/include/hw/xen/inte= rface/event_channel.h index 0d91a1c4af..d446863230 100644 --- a/include/hw/xen/interface/event_channel.h +++ b/include/hw/xen/interface/event_channel.h @@ -302,7 +302,7 @@ typedef struct evtchn_set_priority evtchn_set_priority_= t; * ` enum neg_errnoval * ` HYPERVISOR_event_channel_op_compat(struct evtchn_op *op) * ` - * Superceded by new event_channel_op() hypercall since 0x00030202. + * Superseded by new event_channel_op() hypercall since 0x00030202. */ struct evtchn_op { uint32_t cmd; /* enum event_channel_op */ diff --git a/include/hw/xen/interface/grant_table.h b/include/hw/xen/interf= ace/grant_table.h index 1dfa17a6d0..7652e8bf81 100644 --- a/include/hw/xen/interface/grant_table.h +++ b/include/hw/xen/interface/grant_table.h @@ -607,7 +607,7 @@ DEFINE_XEN_GUEST_HANDLE(gnttab_cache_flush_t); /* * GNTMAP_contains_pte subflag: * 0 =3D> This map request contains a host virtual address. - * 1 =3D> This map request contains the machine addess of the PTE to upd= ate. + * 1 =3D> This map request contains the machine address of the PTE to up= date. */ #define _GNTMAP_contains_pte (4) #define GNTMAP_contains_pte (1<<_GNTMAP_contains_pte) diff --git a/include/hw/xen/interface/hvm/hvm_op.h b/include/hw/xen/interfa= ce/hvm/hvm_op.h index e22adf0319..3defe1c108 100644 --- a/include/hw/xen/interface/hvm/hvm_op.h +++ b/include/hw/xen/interface/hvm/hvm_op.h @@ -337,7 +337,7 @@ struct xen_hvm_altp2m_op { #define HVMOP_altp2m_vcpu_disable_notify 13 /* Get the active vcpu p2m index */ #define HVMOP_altp2m_get_p2m_idx 14 -/* Set the "Supress #VE" bit for a range of pages */ +/* Set the "Suppress #VE" bit for a range of pages */ #define HVMOP_altp2m_set_suppress_ve_multi 15 /* Set visibility for a given altp2m view */ #define HVMOP_altp2m_set_visibility 16 diff --git a/include/hw/xen/interface/io/blkif.h b/include/hw/xen/interface= /io/blkif.h index 22f1eef0c0..4356956975 100644 --- a/include/hw/xen/interface/io/blkif.h +++ b/include/hw/xen/interface/io/blkif.h @@ -42,7 +42,7 @@ * All data in the XenStore is stored as strings. Nodes specifying numeric * values are encoded in decimal. Integer value ranges listed below are * expressed as fixed sized integer types capable of storing the conversion - * of a properly formated node string, without loss of information. + * of a properly formatted node string, without loss of information. * * Any specified default value is in effect if the corresponding XenBus no= de * is not present in the XenStore. @@ -406,7 +406,7 @@ * further requests may reuse these grants and require write permissio= ns. * (9) Linux implementation doesn't have a limit on the maximum number of * grants that can be persistently mapped in the frontend driver, but - * due to the frontent driver implementation it should never be bigger + * due to the frontend driver implementation it should never be bigger * than RING_SIZE * BLKIF_MAX_SEGMENTS_PER_REQUEST. *(10) The discard-secure property may be present and will be set to 1 if = the * backing device supports secure discard. diff --git a/include/hw/xen/interface/io/fbif.h b/include/hw/xen/interface/= io/fbif.h index 93c73195d8..46046f6775 100644 --- a/include/hw/xen/interface/io/fbif.h +++ b/include/hw/xen/interface/io/fbif.h @@ -72,7 +72,7 @@ union xenfb_out_event * just ignore it. Frontends that use the advice should immediately * refresh the framebuffer (and send an update notification event if * those have been requested), then use the update frequency to guide - * their periodical refreshs. + * their periodical refresh. */ #define XENFB_TYPE_REFRESH_PERIOD 1 #define XENFB_NO_REFRESH 0 diff --git a/include/hw/xen/interface/io/kbdif.h b/include/hw/xen/interface= /io/kbdif.h index 4bde6b3821..5794cc33f8 100644 --- a/include/hw/xen/interface/io/kbdif.h +++ b/include/hw/xen/interface/io/kbdif.h @@ -22,7 +22,7 @@ * All data in XenStore is stored as strings. Nodes specifying numeric * values are encoded in decimal. Integer value ranges listed below are * expressed as fixed sized integer types capable of storing the conversion - * of a properly formated node string, without loss of information. + * of a properly formatted node string, without loss of information. * *************************************************************************= **** * Backend XenBus Nodes diff --git a/include/hw/xen/interface/io/ring.h b/include/hw/xen/interface/= io/ring.h index 025939278b..6d8f63d7a5 100644 --- a/include/hw/xen/interface/io/ring.h +++ b/include/hw/xen/interface/io/ring.h @@ -145,7 +145,7 @@ typedef struct __name##_back_ring __name##_back_ring_t * * N.B. these macros do NO INTERLOCKS OR FLOW CONTROL. * This is OK in 1-for-1 request-response situations where the - * requestor (front end) never has more than RING_SIZE()-1 + * requester (front end) never has more than RING_SIZE()-1 * outstanding requests. */ =20 diff --git a/include/hw/xen/interface/memory.h b/include/hw/xen/interface/m= emory.h index 29cf5c8239..ad11573d90 100644 --- a/include/hw/xen/interface/memory.h +++ b/include/hw/xen/interface/memory.h @@ -167,7 +167,7 @@ struct xen_machphys_mfn_list { =20 /* * Pointer to buffer to fill with list of extent starts. If there are - * any large discontiguities in the machine address space, 2MB gaps in + * any large discontinuities in the machine address space, 2MB gaps in * the machphys table will be represented by an MFN base of zero. */ XEN_GUEST_HANDLE(xen_pfn_t) extent_start; diff --git a/include/hw/xen/interface/physdev.h b/include/hw/xen/interface/= physdev.h index f0c0d4727c..053c045cf5 100644 --- a/include/hw/xen/interface/physdev.h +++ b/include/hw/xen/interface/physdev.h @@ -206,7 +206,7 @@ typedef struct physdev_manage_pci_ext physdev_manage_pc= i_ext_t; DEFINE_XEN_GUEST_HANDLE(physdev_manage_pci_ext_t); =20 /* - * Argument to physdev_op_compat() hypercall. Superceded by new physdev_op= () + * Argument to physdev_op_compat() hypercall. Superseded by new physdev_op= () * hypercall since 0x00030202. */ struct physdev_op { @@ -332,7 +332,7 @@ DEFINE_XEN_GUEST_HANDLE(physdev_dbgp_op_t); =20 #if __XEN_INTERFACE_VERSION__ < 0x00040600 /* - * These all-capitals physdev operation names are superceded by the new na= mes + * These all-capitals physdev operation names are superseded by the new na= mes * (defined above) since interface version 0x00030202. The guard above was * added post-4.5 only though and hence shouldn't check for 0x00030202. */ diff --git a/include/hw/xen/interface/xen.h b/include/hw/xen/interface/xen.h index 920567e006..b8fe746f78 100644 --- a/include/hw/xen/interface/xen.h +++ b/include/hw/xen/interface/xen.h @@ -733,8 +733,8 @@ struct shared_info { * are delivered by this mechanism: * 1. Bi-directional inter- and intra-domain connections. Domains must * arrange out-of-band to set up a connection (usually by allocati= ng - * an unbound 'listener' port and avertising that via a storage se= rvice - * such as xenstore). + * an unbound 'listener' port and advertising that via a storage + * service such as xenstore). * 2. Physical interrupts. A domain with suitable hardware-access * privileges can bind an event-channel port to a physical interru= pt * source. --=20 =CE=B3=CE=B1=E1=BF=96=CE=B1 =CF=80=CF=85=CF=81=CE=AF =CE=BC=CE=B9=CF=87=CE= =B8=CE=AE=CF=84=CF=89