aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--tools/examples/xend-config.sxp2
-rw-r--r--xen/arch/x86/hvm/svm/svm.c2
2 files changed, 2 insertions, 2 deletions
diff --git a/tools/examples/xend-config.sxp b/tools/examples/xend-config.sxp
index e33709ae95..283949e29c 100644
--- a/tools/examples/xend-config.sxp
+++ b/tools/examples/xend-config.sxp
@@ -213,7 +213,7 @@
# The VNC server can be told to negotiate a TLS session
# to encryption all traffic, and provide x509 cert to
-# clients enalbing them to verify server identity. The
+# clients enabling them to verify server identity. The
# GTK-VNC widget, virt-viewer, virt-manager and VeNCrypt
# all support the VNC extension for TLS used in QEMU. The
# TightVNC/RealVNC/UltraVNC clients do not.
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
index b077f59499..1cef8be5cb 100644
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -460,7 +460,7 @@ static void svm_update_guest_efer(struct vcpu *v)
/*
* In legacy mode (EFER.LMA=0) we natively support SYSENTER/SYSEXIT with
- * no need for MSR intercepts. Ehen EFER.LMA=1 we must trap and emulate.
+ * no need for MSR intercepts. When EFER.LMA=1 we must trap and emulate.
*/
svm_intercept_msr(v, MSR_IA32_SYSENTER_CS, lma);
svm_intercept_msr(v, MSR_IA32_SYSENTER_ESP, lma);