diff --git a/docs/formatdomain.html.in b/docs/formatdomain.html.in index 096e2a3f33..1850a2b8c3 100644 --- a/docs/formatdomain.html.in +++ b/docs/formatdomain.html.in @@ -2777,7 +2777,7 @@ (for the legacy device assignment handled directly by the KVM kernel module)Since 1.0.5 (QEMU and KVM only, requires kernel 3.6 or newer). The default, when - the driver name is not explicitly specified, is to check wether + the driver name is not explicitly specified, is to check whether VFIO is available and use it if it's the case. If VFIO is not available, the legacy "kvm" assignment is attempted. diff --git a/docs/securityprocess.html.in b/docs/securityprocess.html.in index c29ae80def..3efd6870d4 100644 --- a/docs/securityprocess.html.in +++ b/docs/securityprocess.html.in @@ -67,7 +67,7 @@ The libvirt security team operates a policy of responsible disclosure. As such any security issue reported, that is not already publically disclosed - elswhere, will have an embargo date assigned. Members of the security team agree + elsewhere, will have an embargo date assigned. Members of the security team agree not to publically disclose any details of the security issue until the embargo date expires.

diff --git a/src/conf/domain_conf.c b/src/conf/domain_conf.c index 7b0e3eafa0..140eb80543 100644 --- a/src/conf/domain_conf.c +++ b/src/conf/domain_conf.c @@ -11478,7 +11478,7 @@ virDomainDefParseXML(xmlDocPtr xml, if ((tmp = virXPathString("string(./@state)", ctxt))) { if ((def->features[val] = virDomainFeatureStateTypeFromString(tmp)) == -1) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unknown state atribute '%s' of feature '%s'"), + _("unknown state attribute '%s' of feature '%s'"), tmp, virDomainFeatureTypeToString(val)); goto error; }