[libvirt] [PATCH] docs: fix typos

Osier Yang jyang at redhat.com
Wed Feb 16 04:17:38 UTC 2011


于 2011年02月16日 04:51, Eric Blake 写道:
> * docs/drvopenvz.html.in: Spell administrator correctly.
> * docs/drvuml.html.in: Likewise.
> * src/qemu/qemu.conf: Likewise.  Fix other typos, too.
> ---
>
> Pushing under the obvious rule.
>
>   docs/drvopenvz.html.in |    2 +-
>   docs/drvuml.html.in    |    2 +-
>   src/qemu/qemu.conf     |   25 +++++++++++++------------
>   3 files changed, 15 insertions(+), 14 deletions(-)
>
> diff --git a/docs/drvopenvz.html.in b/docs/drvopenvz.html.in
> index 485d209..ddd6ac1 100644
> --- a/docs/drvopenvz.html.in
> +++ b/docs/drvopenvz.html.in
> @@ -55,7 +55,7 @@ openvz+ssh://root@example.com/system (remote access, SSH tunnelled)
>       OpenVZ releases later than 3.0.23 ship with a standard network device
>       setup script that is able to setup bridging, named
>       <code>/usr/sbin/vznetaddbr</code>. For releases prior to 3.0.23, this
> -    script must be created manually by the host OS adminstrator. The
> +    script must be created manually by the host OS administrator. The
>       simplest way is to just download the latest version of this script
>       from a newer OpenVZ release, or upstream source repository. Then
>       a generic configuration file<code>/etc/vz/vznetctl.conf</code>
> diff --git a/docs/drvuml.html.in b/docs/drvuml.html.in
> index 9e5db95..d18e9cc 100644
> --- a/docs/drvuml.html.in
> +++ b/docs/drvuml.html.in
> @@ -7,7 +7,7 @@
>       guests built for User Mode Linux. UML requires no special support in
>       the host kernel, so can be used by any user of any linux system, provided
>       they have enough free RAM for their guest's needs, though there are
> -    certain restrictions on network connectivity unless the adminstrator
> +    certain restrictions on network connectivity unless the administrator
>       has pre-created TAP devices.
>       </p>
>
> diff --git a/src/qemu/qemu.conf b/src/qemu/qemu.conf
> index 66310d4..8c6b996 100644
> --- a/src/qemu/qemu.conf
> +++ b/src/qemu/qemu.conf
> @@ -47,7 +47,7 @@
>
>   # The default TLS configuration only uses certificates for the server
>   # allowing the client to verify the server's identity and establish
> -# and encrypted channel.
> +# an encrypted channel.
>   #
>   # It is possible to use x509 certificates for authentication too, by
>   # issuing a x509 certificate to every client who needs to connect.
> @@ -62,9 +62,9 @@
>   # VNC passwords. This parameter is only used if the per-domain
>   # XML config does not already provide a password. To allow
>   # access without passwords, leave this commented out. An empty
> -# string will still enable passwords, but be rejected by QEMU
> +# string will still enable passwords, but be rejected by QEMU,
>   # effectively preventing any use of VNC. Obviously change this
> -# example here before you set this
> +# example here before you set this.
>   #
>   # vnc_password = "XYZ12345"
>
> @@ -115,7 +115,7 @@
>   #  server-cert.pem - the server certificate signed with ca-cert.pem
>   #  server-key.pem  - the server private key
>   #
> -# This option allows the certificate directory to be changed
> +# This option allows the certificate directory to be changed.
>   #
>   # spice_tls_x509_cert_dir = "/etc/pki/libvirt-spice"
>
> @@ -124,8 +124,8 @@
>   # per-domain XML config does not already provide a password. To
>   # allow access without passwords, leave this commented out. An
>   # empty string will still enable passwords, but be rejected by
> -# QEMU effectively preventing any use of SPICE. Obviously change
> -# this example here before you set this
> +# QEMU, effectively preventing any use of SPICE. Obviously change
> +# this example here before you set this.
>   #
>   # spice_password = "XYZ12345"
>
> @@ -134,15 +134,15 @@
>   # on the host, then the security driver will automatically disable
>   # itself. If you wish to disable QEMU SELinux security driver while
>   # leaving SELinux enabled for the host in general, then set this
> -# to 'none' instead
> +# to 'none' instead.
>   #
>   # security_driver = "selinux"
>
>
> -# The user ID for QEMU processes run by the system instance
> +# The user ID for QEMU processes run by the system instance.
>   #user = "root"
>
> -# The group ID for QEMU processes run by the system instance
> +# The group ID for QEMU processes run by the system instance.
>   #group = "root"
>
>   # Whether libvirt should dynamically change file ownership
> @@ -155,14 +155,15 @@
>   #
>   #  - 'cpu' - use for schedular tunables
>   #  - 'devices' - use for device whitelisting
> +#  - 'memory' - use for memory tunables
>   #
>   # NB, even if configured here, they won't be used unless
> -# the adminsitrator has mounted cgroups. eg
> +# the administrator has mounted cgroups, e.g.:
>   #
>   #  mkdir /dev/cgroup
>   #  mount -t cgroup -o devices,cpu,memory none /dev/cgroup
>   #
> -# They can be mounted anywhere, and different controlers
> +# They can be mounted anywhere, and different controllers
>   # can be mounted in different locations. libvirt will detect
>   # where they are located.
>   #
> @@ -175,7 +176,7 @@
>   # all sound device, and all PTY devices are allowed.
>   #
>   # This will only need setting if newer QEMU suddenly
> -# wants some device we don't already know a bout.
> +# wants some device we don't already know about.
>   #
>   #cgroup_device_acl = [
>   #    "/dev/null", "/dev/full", "/dev/zero",

ACK, quite carefully fixes.

Regards
Osier




More information about the libvir-list mailing list