While the helper method is executing, no locks are held on either
the client or server, but the ref count on the 'struct qemud_client'
object is incremented to ensure its not deleted. The helper can
-now safely invoke the neccessary libvirt API call.
+now safely invoke the necessary libvirt API call.
Thus, if a vendor / distributor has configured their libvirt package
to run as 'qemu' by default, a number of changes will be required
before an administrator can change a host to run guests as root.
- In particular it will be neccessary to change ownership on the
+ In particular it will be necessary to change ownership on the
directories <code>/var/run/libvirt/qemu/</code>,
<code>/var/lib/libvirt/qemu/</code> and
<code>/var/cache/libvirt/qemu/</code> back to root, in addition
%endif
-# Now set the defaults for all the important features, independant
+# Now set the defaults for all the important features, independent
# of any particular OS
# First the daemon itself
if (taskInfoState != esxVI_TaskInfoState_Success) {
ESX_ERROR(domain->conn, VIR_ERR_INTERNAL_ERROR,
- "Could not destory domain");
+ "Could not destroy domain");
goto failure;
}
* Write a series of bytes to the stream. This method may
* block the calling application for an arbitrary amount
* of time. Once an application has finished sending data
- * it should call virStreamFinish to wait for succesful
+ * it should call virStreamFinish to wait for successful
* confirmation from the driver, or detect any error
*
* This method may not be used if a stream source has been
if (openvzSetInitialConfig(conn, vm->def) < 0) {
openvzError(conn, VIR_ERR_INTERNAL_ERROR,
- "%s", _("Error creating intial configuration"));
+ "%s", _("Error creating initial configuration"));
goto cleanup;
}
if (openvzSetInitialConfig(conn, vm->def) < 0) {
openvzError(conn, VIR_ERR_INTERNAL_ERROR,
- "%s", _("Error creating intial configuration"));
+ "%s", _("Error creating initial configuration"));
goto cleanup;
}
* NB(4) This is very complicated. Due to connection cloning, multiple
* threads can want to use the socket at once. Obviously only one of
* them can. So if someone's using the socket, other threads are put
- * to sleep on condition variables. THe existing thread may completely
+ * to sleep on condition variables. The existing thread may completely
* send & receive their RPC call/reply while they're asleep. Or it
* may only get around to dealing with sending the call. Or it may
* get around to neither. So upon waking up from slumber, the other
/* if the error complaint is related to an image hosted on
* an nfs mount, or a usbfs/sysfs filesystem not supporting
* labelling, then just ignore it & hope for the best.
- * The user hopefully set one of the neccessary SELinux
+ * The user hopefully set one of the necessary SELinux
* virt_use_{nfs,usb,pci} boolean tunables to allow it...
*/
if (setfilecon_errno != EOPNOTSUPP) {
/*
* @conn Connection to report errors against
* @argv argv to exec
- * @envp optional enviroment to use for exec
+ * @envp optional environment to use for exec
* @keepfd options fd_ret to keep open for child process
* @retpid optional pointer to store child process pid
* @infd optional file descriptor to use as child input, otherwise /dev/null
(data->vboxSession == NULL))
goto cleanup;
- DEBUG0("network intialized");
+ DEBUG0("network initialized");
/* conn->networkPrivateData = some network specific data */
return VIR_DRV_OPEN_SUCCESS;
}
static int vboxNetworkClose(virConnectPtr conn) {
- DEBUG0("network unintialized");
+ DEBUG0("network uninitialized");
conn->networkPrivateData = NULL;
return 0;
}
(data->vboxSession == NULL))
goto cleanup;
- DEBUG0("vbox storage intialized");
+ DEBUG0("vbox storage initialized");
/* conn->storagePrivateData = some storage specific data */
return VIR_DRV_OPEN_SUCCESS;
}
static int vboxStorageClose (virConnectPtr conn) {
- DEBUG0("vbox storage unintialized");
+ DEBUG0("vbox storage uninitialized");
conn->storagePrivateData = NULL;
return 0;
}
(*
- * Prior to validating a function, intialize these
+ * Prior to validating a function, initialize these
* to VS.empty
*
* They contain the list of driver and object variables
=head1 DESCRIPTION
-This tool validates that the neccessary PKI files are configured for
+This tool validates that the necessary PKI files are configured for
a secure libvirt server or client using the TLS encryption protocol.
It will report any missing certificate or key files on the host. It
-should be run as root to ensure it can read all the neccessary files
+should be run as root to ensure it can read all the necessary files
=head1 EXIT STATUS