mirror of https://gitee.com/openkylin/libvirt.git
docs: fix typos
* docs/drvopenvz.html.in: Spell administrator correctly. * docs/drvuml.html.in: Likewise. * src/qemu/qemu.conf: Likewise. Fix other typos, too.
This commit is contained in:
parent
251ad3b28b
commit
c106a83712
|
@ -55,7 +55,7 @@ openvz+ssh://root@example.com/system (remote access, SSH tunnelled)
|
||||||
OpenVZ releases later than 3.0.23 ship with a standard network device
|
OpenVZ releases later than 3.0.23 ship with a standard network device
|
||||||
setup script that is able to setup bridging, named
|
setup script that is able to setup bridging, named
|
||||||
<code>/usr/sbin/vznetaddbr</code>. For releases prior to 3.0.23, this
|
<code>/usr/sbin/vznetaddbr</code>. For releases prior to 3.0.23, this
|
||||||
script must be created manually by the host OS adminstrator. The
|
script must be created manually by the host OS administrator. The
|
||||||
simplest way is to just download the latest version of this script
|
simplest way is to just download the latest version of this script
|
||||||
from a newer OpenVZ release, or upstream source repository. Then
|
from a newer OpenVZ release, or upstream source repository. Then
|
||||||
a generic configuration file <code>/etc/vz/vznetctl.conf</code>
|
a generic configuration file <code>/etc/vz/vznetctl.conf</code>
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
guests built for User Mode Linux. UML requires no special support in
|
guests built for User Mode Linux. UML requires no special support in
|
||||||
the host kernel, so can be used by any user of any linux system, provided
|
the host kernel, so can be used by any user of any linux system, provided
|
||||||
they have enough free RAM for their guest's needs, though there are
|
they have enough free RAM for their guest's needs, though there are
|
||||||
certain restrictions on network connectivity unless the adminstrator
|
certain restrictions on network connectivity unless the administrator
|
||||||
has pre-created TAP devices.
|
has pre-created TAP devices.
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
|
@ -47,7 +47,7 @@
|
||||||
|
|
||||||
# The default TLS configuration only uses certificates for the server
|
# The default TLS configuration only uses certificates for the server
|
||||||
# allowing the client to verify the server's identity and establish
|
# allowing the client to verify the server's identity and establish
|
||||||
# and encrypted channel.
|
# an encrypted channel.
|
||||||
#
|
#
|
||||||
# It is possible to use x509 certificates for authentication too, by
|
# It is possible to use x509 certificates for authentication too, by
|
||||||
# issuing a x509 certificate to every client who needs to connect.
|
# issuing a x509 certificate to every client who needs to connect.
|
||||||
|
@ -62,9 +62,9 @@
|
||||||
# VNC passwords. This parameter is only used if the per-domain
|
# VNC passwords. This parameter is only used if the per-domain
|
||||||
# XML config does not already provide a password. To allow
|
# XML config does not already provide a password. To allow
|
||||||
# access without passwords, leave this commented out. An empty
|
# access without passwords, leave this commented out. An empty
|
||||||
# string will still enable passwords, but be rejected by QEMU
|
# string will still enable passwords, but be rejected by QEMU,
|
||||||
# effectively preventing any use of VNC. Obviously change this
|
# effectively preventing any use of VNC. Obviously change this
|
||||||
# example here before you set this
|
# example here before you set this.
|
||||||
#
|
#
|
||||||
# vnc_password = "XYZ12345"
|
# vnc_password = "XYZ12345"
|
||||||
|
|
||||||
|
@ -115,7 +115,7 @@
|
||||||
# server-cert.pem - the server certificate signed with ca-cert.pem
|
# server-cert.pem - the server certificate signed with ca-cert.pem
|
||||||
# server-key.pem - the server private key
|
# server-key.pem - the server private key
|
||||||
#
|
#
|
||||||
# This option allows the certificate directory to be changed
|
# This option allows the certificate directory to be changed.
|
||||||
#
|
#
|
||||||
# spice_tls_x509_cert_dir = "/etc/pki/libvirt-spice"
|
# spice_tls_x509_cert_dir = "/etc/pki/libvirt-spice"
|
||||||
|
|
||||||
|
@ -124,8 +124,8 @@
|
||||||
# per-domain XML config does not already provide a password. To
|
# per-domain XML config does not already provide a password. To
|
||||||
# allow access without passwords, leave this commented out. An
|
# allow access without passwords, leave this commented out. An
|
||||||
# empty string will still enable passwords, but be rejected by
|
# empty string will still enable passwords, but be rejected by
|
||||||
# QEMU effectively preventing any use of SPICE. Obviously change
|
# QEMU, effectively preventing any use of SPICE. Obviously change
|
||||||
# this example here before you set this
|
# this example here before you set this.
|
||||||
#
|
#
|
||||||
# spice_password = "XYZ12345"
|
# spice_password = "XYZ12345"
|
||||||
|
|
||||||
|
@ -134,15 +134,15 @@
|
||||||
# on the host, then the security driver will automatically disable
|
# on the host, then the security driver will automatically disable
|
||||||
# itself. If you wish to disable QEMU SELinux security driver while
|
# itself. If you wish to disable QEMU SELinux security driver while
|
||||||
# leaving SELinux enabled for the host in general, then set this
|
# leaving SELinux enabled for the host in general, then set this
|
||||||
# to 'none' instead
|
# to 'none' instead.
|
||||||
#
|
#
|
||||||
# security_driver = "selinux"
|
# security_driver = "selinux"
|
||||||
|
|
||||||
|
|
||||||
# The user ID for QEMU processes run by the system instance
|
# The user ID for QEMU processes run by the system instance.
|
||||||
#user = "root"
|
#user = "root"
|
||||||
|
|
||||||
# The group ID for QEMU processes run by the system instance
|
# The group ID for QEMU processes run by the system instance.
|
||||||
#group = "root"
|
#group = "root"
|
||||||
|
|
||||||
# Whether libvirt should dynamically change file ownership
|
# Whether libvirt should dynamically change file ownership
|
||||||
|
@ -155,14 +155,15 @@
|
||||||
#
|
#
|
||||||
# - 'cpu' - use for schedular tunables
|
# - 'cpu' - use for schedular tunables
|
||||||
# - 'devices' - use for device whitelisting
|
# - 'devices' - use for device whitelisting
|
||||||
|
# - 'memory' - use for memory tunables
|
||||||
#
|
#
|
||||||
# NB, even if configured here, they won't be used unless
|
# NB, even if configured here, they won't be used unless
|
||||||
# the adminsitrator has mounted cgroups. eg
|
# the administrator has mounted cgroups, e.g.:
|
||||||
#
|
#
|
||||||
# mkdir /dev/cgroup
|
# mkdir /dev/cgroup
|
||||||
# mount -t cgroup -o devices,cpu,memory none /dev/cgroup
|
# mount -t cgroup -o devices,cpu,memory none /dev/cgroup
|
||||||
#
|
#
|
||||||
# They can be mounted anywhere, and different controlers
|
# They can be mounted anywhere, and different controllers
|
||||||
# can be mounted in different locations. libvirt will detect
|
# can be mounted in different locations. libvirt will detect
|
||||||
# where they are located.
|
# where they are located.
|
||||||
#
|
#
|
||||||
|
|
Loading…
Reference in New Issue