[libvirt] [PATCH] Fix up a few typos in the tree.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Signed-off-by: Chris Lalancette <clalance@xxxxxxxxxx>
---
 daemon/THREADING.txt            |    2 +-
 docs/drvqemu.html.in            |    2 +-
 libvirt.spec.in                 |    2 +-
 src/esx/esx_driver.c            |    2 +-
 src/libvirt.c                   |    2 +-
 src/openvz/openvz_driver.c      |    4 ++--
 src/remote/remote_driver.c      |    2 +-
 src/security/security_selinux.c |    2 +-
 src/util/util.c                 |    2 +-
 src/vbox/vbox_tmpl.c            |    8 ++++----
 tests/object-locking.ml         |    2 +-
 tools/virt-pki-validate.in      |    4 ++--
 12 files changed, 17 insertions(+), 17 deletions(-)

diff --git a/daemon/THREADING.txt b/daemon/THREADING.txt
index 4c7a616..4be71d6 100644
--- a/daemon/THREADING.txt
+++ b/daemon/THREADING.txt
@@ -59,4 +59,4 @@ for the associated RPC call.
 While the helper method is executing, no locks are held on either
 the client or server, but the ref count on the 'struct qemud_client'
 object is incremented to ensure its not deleted. The helper can
-now safely invoke the neccessary libvirt API call.
+now safely invoke the necessary libvirt API call.
diff --git a/docs/drvqemu.html.in b/docs/drvqemu.html.in
index dd89fc3..024835c 100644
--- a/docs/drvqemu.html.in
+++ b/docs/drvqemu.html.in
@@ -208,7 +208,7 @@
       Thus, if a vendor / distributor has configured their libvirt package
       to run as 'qemu' by default, a number of changes will be required
       before an administrator can change a host to run guests as root.
-      In particular it will be neccessary to change ownership on the
+      In particular it will be necessary to change ownership on the
       directories <code>/var/run/libvirt/qemu/</code>,
       <code>/var/lib/libvirt/qemu/</code> and
       <code>/var/cache/libvirt/qemu/</code> back to root, in addition
diff --git a/libvirt.spec.in b/libvirt.spec.in
index 7b5c4d7..e02e588 100644
--- a/libvirt.spec.in
+++ b/libvirt.spec.in
@@ -22,7 +22,7 @@
 %endif
 
 
-# Now set the defaults for all the important features, independant
+# Now set the defaults for all the important features, independent
 # of any particular OS
 
 # First the daemon itself
diff --git a/src/esx/esx_driver.c b/src/esx/esx_driver.c
index 5754b24..ec0cc14 100644
--- a/src/esx/esx_driver.c
+++ b/src/esx/esx_driver.c
@@ -1486,7 +1486,7 @@ esxDomainDestroy(virDomainPtr domain)
 
     if (taskInfoState != esxVI_TaskInfoState_Success) {
         ESX_ERROR(domain->conn, VIR_ERR_INTERNAL_ERROR,
-                  "Could not destory domain");
+                  "Could not destroy domain");
         goto failure;
     }
 
diff --git a/src/libvirt.c b/src/libvirt.c
index bcb89e1..ee5fbfd 100644
--- a/src/libvirt.c
+++ b/src/libvirt.c
@@ -9423,7 +9423,7 @@ virStreamRef(virStreamPtr stream)
  * Write a series of bytes to the stream. This method may
  * block the calling application for an arbitrary amount
  * of time. Once an application has finished sending data
- * it should call virStreamFinish to wait for succesful
+ * it should call virStreamFinish to wait for successful
  * confirmation from the driver, or detect any error
  *
  * This method may not be used if a stream source has been
diff --git a/src/openvz/openvz_driver.c b/src/openvz/openvz_driver.c
index 54bcaa9..d577be1 100644
--- a/src/openvz/openvz_driver.c
+++ b/src/openvz/openvz_driver.c
@@ -780,7 +780,7 @@ openvzDomainDefineXML(virConnectPtr conn, const char *xml)
 
     if (openvzSetInitialConfig(conn, vm->def) < 0) {
         openvzError(conn, VIR_ERR_INTERNAL_ERROR,
-                "%s", _("Error creating intial configuration"));
+                "%s", _("Error creating initial configuration"));
         goto cleanup;
     }
 
@@ -847,7 +847,7 @@ openvzDomainCreateXML(virConnectPtr conn, const char *xml,
 
     if (openvzSetInitialConfig(conn, vm->def) < 0) {
         openvzError(conn, VIR_ERR_INTERNAL_ERROR,
-                "%s", _("Error creating intial configuration"));
+                "%s", _("Error creating initial configuration"));
         goto cleanup;
     }
 
diff --git a/src/remote/remote_driver.c b/src/remote/remote_driver.c
index 135b0d6..731b213 100644
--- a/src/remote/remote_driver.c
+++ b/src/remote/remote_driver.c
@@ -7915,7 +7915,7 @@ error:
  * NB(4) This is very complicated. Due to connection cloning, multiple
  * threads can want to use the socket at once. Obviously only one of
  * them can. So if someone's using the socket, other threads are put
- * to sleep on condition variables. THe existing thread may completely
+ * to sleep on condition variables. The existing thread may completely
  * send & receive their RPC call/reply while they're asleep. Or it
  * may only get around to dealing with sending the call. Or it may
  * get around to neither. So upon waking up from slumber, the other
diff --git a/src/security/security_selinux.c b/src/security/security_selinux.c
index 670fcb2..bdd9eb2 100644
--- a/src/security/security_selinux.c
+++ b/src/security/security_selinux.c
@@ -329,7 +329,7 @@ SELinuxSetFilecon(virConnectPtr conn, const char *path, char *tcon)
         /* if the error complaint is related to an image hosted on
          * an nfs mount, or a usbfs/sysfs filesystem not supporting
          * labelling, then just ignore it & hope for the best.
-         * The user hopefully set one of the neccessary SELinux
+         * The user hopefully set one of the necessary SELinux
          * virt_use_{nfs,usb,pci}  boolean tunables to allow it...
          */
         if (setfilecon_errno != EOPNOTSUPP) {
diff --git a/src/util/util.c b/src/util/util.c
index ef07a6a..f474ead 100644
--- a/src/util/util.c
+++ b/src/util/util.c
@@ -297,7 +297,7 @@ static int virClearCapabilities(void)
 /*
  * @conn Connection to report errors against
  * @argv argv to exec
- * @envp optional enviroment to use for exec
+ * @envp optional environment to use for exec
  * @keepfd options fd_ret to keep open for child process
  * @retpid optional pointer to store child process pid
  * @infd optional file descriptor to use as child input, otherwise /dev/null
diff --git a/src/vbox/vbox_tmpl.c b/src/vbox/vbox_tmpl.c
index 154859a..72220e1 100644
--- a/src/vbox/vbox_tmpl.c
+++ b/src/vbox/vbox_tmpl.c
@@ -4761,7 +4761,7 @@ static virDrvOpenStatus vboxNetworkOpen(virConnectPtr conn,
         (data->vboxSession == NULL))
         goto cleanup;
 
-    DEBUG0("network intialized");
+    DEBUG0("network initialized");
     /* conn->networkPrivateData = some network specific data */
     return VIR_DRV_OPEN_SUCCESS;
 
@@ -4770,7 +4770,7 @@ cleanup:
 }
 
 static int vboxNetworkClose(virConnectPtr conn) {
-    DEBUG0("network unintialized");
+    DEBUG0("network uninitialized");
     conn->networkPrivateData = NULL;
     return 0;
 }
@@ -5606,7 +5606,7 @@ static virDrvOpenStatus vboxStorageOpen (virConnectPtr conn,
         (data->vboxSession == NULL))
         goto cleanup;
 
-    DEBUG0("vbox storage intialized");
+    DEBUG0("vbox storage initialized");
     /* conn->storagePrivateData = some storage specific data */
     return VIR_DRV_OPEN_SUCCESS;
 
@@ -5615,7 +5615,7 @@ cleanup:
 }
 
 static int vboxStorageClose (virConnectPtr conn) {
-    DEBUG0("vbox storage unintialized");
+    DEBUG0("vbox storage uninitialized");
     conn->storagePrivateData = NULL;
     return 0;
 }
diff --git a/tests/object-locking.ml b/tests/object-locking.ml
index 0c66fc7..a4cd77d 100644
--- a/tests/object-locking.ml
+++ b/tests/object-locking.ml
@@ -332,7 +332,7 @@ let isLockableDriverNull exp =
 
 
 (*
- * Prior to validating a function, intialize these
+ * Prior to validating a function, initialize these
  * to VS.empty
  *
  * They contain the list of driver and object variables
diff --git a/tools/virt-pki-validate.in b/tools/virt-pki-validate.in
index f3d3218..a428a96 100755
--- a/tools/virt-pki-validate.in
+++ b/tools/virt-pki-validate.in
@@ -275,10 +275,10 @@ exit 0
 
 =head1 DESCRIPTION
 
-This tool validates that the neccessary PKI files are configured for
+This tool validates that the necessary PKI files are configured for
 a secure libvirt server or client using the TLS encryption protocol.
 It will report any missing certificate or key files on the host. It
-should be run as root to ensure it can read all the neccessary files
+should be run as root to ensure it can read all the necessary files
 
 =head1 EXIT STATUS
 
-- 
1.6.0.6

--
Libvir-list mailing list
Libvir-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/libvir-list

[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]