docs: fix typos

* docs/drvopenvz.html.in: Spell administrator correctly.
* docs/drvuml.html.in: Likewise.
* src/qemu/qemu.conf: Likewise.  Fix other typos, too.
This commit is contained in:
Eric Blake 2011-02-15 13:50:28 -07:00
parent 251ad3b28b
commit c106a83712
3 changed files with 15 additions and 14 deletions

View File

@ -55,7 +55,7 @@ openvz+ssh://root@example.com/system (remote access, SSH tunnelled)
OpenVZ releases later than 3.0.23 ship with a standard network device OpenVZ releases later than 3.0.23 ship with a standard network device
setup script that is able to setup bridging, named setup script that is able to setup bridging, named
<code>/usr/sbin/vznetaddbr</code>. For releases prior to 3.0.23, this <code>/usr/sbin/vznetaddbr</code>. For releases prior to 3.0.23, this
script must be created manually by the host OS adminstrator. The script must be created manually by the host OS administrator. The
simplest way is to just download the latest version of this script simplest way is to just download the latest version of this script
from a newer OpenVZ release, or upstream source repository. Then from a newer OpenVZ release, or upstream source repository. Then
a generic configuration file <code>/etc/vz/vznetctl.conf</code> a generic configuration file <code>/etc/vz/vznetctl.conf</code>

View File

@ -7,7 +7,7 @@
guests built for User Mode Linux. UML requires no special support in guests built for User Mode Linux. UML requires no special support in
the host kernel, so can be used by any user of any linux system, provided the host kernel, so can be used by any user of any linux system, provided
they have enough free RAM for their guest's needs, though there are they have enough free RAM for their guest's needs, though there are
certain restrictions on network connectivity unless the adminstrator certain restrictions on network connectivity unless the administrator
has pre-created TAP devices. has pre-created TAP devices.
</p> </p>

View File

@ -47,7 +47,7 @@
# The default TLS configuration only uses certificates for the server # The default TLS configuration only uses certificates for the server
# allowing the client to verify the server's identity and establish # allowing the client to verify the server's identity and establish
# and encrypted channel. # an encrypted channel.
# #
# It is possible to use x509 certificates for authentication too, by # It is possible to use x509 certificates for authentication too, by
# issuing a x509 certificate to every client who needs to connect. # issuing a x509 certificate to every client who needs to connect.
@ -62,9 +62,9 @@
# VNC passwords. This parameter is only used if the per-domain # VNC passwords. This parameter is only used if the per-domain
# XML config does not already provide a password. To allow # XML config does not already provide a password. To allow
# access without passwords, leave this commented out. An empty # access without passwords, leave this commented out. An empty
# string will still enable passwords, but be rejected by QEMU # string will still enable passwords, but be rejected by QEMU,
# effectively preventing any use of VNC. Obviously change this # effectively preventing any use of VNC. Obviously change this
# example here before you set this # example here before you set this.
# #
# vnc_password = "XYZ12345" # vnc_password = "XYZ12345"
@ -115,7 +115,7 @@
# server-cert.pem - the server certificate signed with ca-cert.pem # server-cert.pem - the server certificate signed with ca-cert.pem
# server-key.pem - the server private key # server-key.pem - the server private key
# #
# This option allows the certificate directory to be changed # This option allows the certificate directory to be changed.
# #
# spice_tls_x509_cert_dir = "/etc/pki/libvirt-spice" # spice_tls_x509_cert_dir = "/etc/pki/libvirt-spice"
@ -124,8 +124,8 @@
# per-domain XML config does not already provide a password. To # per-domain XML config does not already provide a password. To
# allow access without passwords, leave this commented out. An # allow access without passwords, leave this commented out. An
# empty string will still enable passwords, but be rejected by # empty string will still enable passwords, but be rejected by
# QEMU effectively preventing any use of SPICE. Obviously change # QEMU, effectively preventing any use of SPICE. Obviously change
# this example here before you set this # this example here before you set this.
# #
# spice_password = "XYZ12345" # spice_password = "XYZ12345"
@ -134,15 +134,15 @@
# on the host, then the security driver will automatically disable # on the host, then the security driver will automatically disable
# itself. If you wish to disable QEMU SELinux security driver while # itself. If you wish to disable QEMU SELinux security driver while
# leaving SELinux enabled for the host in general, then set this # leaving SELinux enabled for the host in general, then set this
# to 'none' instead # to 'none' instead.
# #
# security_driver = "selinux" # security_driver = "selinux"
# The user ID for QEMU processes run by the system instance # The user ID for QEMU processes run by the system instance.
#user = "root" #user = "root"
# The group ID for QEMU processes run by the system instance # The group ID for QEMU processes run by the system instance.
#group = "root" #group = "root"
# Whether libvirt should dynamically change file ownership # Whether libvirt should dynamically change file ownership
@ -155,14 +155,15 @@
# #
# - 'cpu' - use for schedular tunables # - 'cpu' - use for schedular tunables
# - 'devices' - use for device whitelisting # - 'devices' - use for device whitelisting
# - 'memory' - use for memory tunables
# #
# NB, even if configured here, they won't be used unless # NB, even if configured here, they won't be used unless
# the adminsitrator has mounted cgroups. eg # the administrator has mounted cgroups, e.g.:
# #
# mkdir /dev/cgroup # mkdir /dev/cgroup
# mount -t cgroup -o devices,cpu,memory none /dev/cgroup # mount -t cgroup -o devices,cpu,memory none /dev/cgroup
# #
# They can be mounted anywhere, and different controlers # They can be mounted anywhere, and different controllers
# can be mounted in different locations. libvirt will detect # can be mounted in different locations. libvirt will detect
# where they are located. # where they are located.
# #
@ -175,7 +176,7 @@
# all sound device, and all PTY devices are allowed. # all sound device, and all PTY devices are allowed.
# #
# This will only need setting if newer QEMU suddenly # This will only need setting if newer QEMU suddenly
# wants some device we don't already know a bout. # wants some device we don't already know about.
# #
#cgroup_device_acl = [ #cgroup_device_acl = [
# "/dev/null", "/dev/full", "/dev/zero", # "/dev/null", "/dev/full", "/dev/zero",