diff -r 323ae92f774b tools/examples/xend-config.sxp --- a/tools/examples/xend-config.sxp Wed Jul 15 09:14:19 2009 +0100 +++ b/tools/examples/xend-config.sxp Wed Jul 15 10:33:59 2009 +0200 @@ -213,7 +213,7 @@ # The VNC server can be told to negotiate a TLS session # to encryption all traffic, and provide x509 cert to -# clients enalbing them to verify server identity. The +# clients enabling them to verify server identity. The # GTK-VNC widget, virt-viewer, virt-manager and VeNCrypt # all support the VNC extension for TLS used in QEMU. The # TightVNC/RealVNC/UltraVNC clients do not. diff -r 323ae92f774b xen/arch/x86/hvm/svm/svm.c --- a/xen/arch/x86/hvm/svm/svm.c Wed Jul 15 09:14:19 2009 +0100 +++ b/xen/arch/x86/hvm/svm/svm.c Wed Jul 15 10:33:59 2009 +0200 @@ -460,7 +460,7 @@ static void svm_update_guest_efer(struct /* * In legacy mode (EFER.LMA=0) we natively support SYSENTER/SYSEXIT with - * no need for MSR intercepts. Ehen EFER.LMA=1 we must trap and emulate. + * no need for MSR intercepts. When EFER.LMA=1 we must trap and emulate. */ svm_intercept_msr(v, MSR_IA32_SYSENTER_CS, lma); svm_intercept_msr(v, MSR_IA32_SYSENTER_ESP, lma);