diff options
-rw-r--r-- | tools/examples/xend-config.sxp | 2 | ||||
-rw-r--r-- | xen/arch/x86/hvm/svm/svm.c | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/tools/examples/xend-config.sxp b/tools/examples/xend-config.sxp index e33709ae95..283949e29c 100644 --- a/tools/examples/xend-config.sxp +++ b/tools/examples/xend-config.sxp @@ -213,7 +213,7 @@ # The VNC server can be told to negotiate a TLS session # to encryption all traffic, and provide x509 cert to -# clients enalbing them to verify server identity. The +# clients enabling them to verify server identity. The # GTK-VNC widget, virt-viewer, virt-manager and VeNCrypt # all support the VNC extension for TLS used in QEMU. The # TightVNC/RealVNC/UltraVNC clients do not. diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c index b077f59499..1cef8be5cb 100644 --- a/xen/arch/x86/hvm/svm/svm.c +++ b/xen/arch/x86/hvm/svm/svm.c @@ -460,7 +460,7 @@ static void svm_update_guest_efer(struct vcpu *v) /* * In legacy mode (EFER.LMA=0) we natively support SYSENTER/SYSEXIT with - * no need for MSR intercepts. Ehen EFER.LMA=1 we must trap and emulate. + * no need for MSR intercepts. When EFER.LMA=1 we must trap and emulate. */ svm_intercept_msr(v, MSR_IA32_SYSENTER_CS, lma); svm_intercept_msr(v, MSR_IA32_SYSENTER_ESP, lma); |