···2727 * this it needs a backend to manage the datas, the same as other
2828 * memory-related devices. In this case as the backend is so trivial we
2929 * have merged it with the frontend instead of creating and maintaining a
3030- * seperate backend.
3030+ * separate backend.
3131 */
32323333#include "qemu/osdep.h"
···7979 "loading memory values");
8080 return;
8181 } else if (!s->data_len) {
8282- /* We cant' check for !data here as a value of 0 is still valid. */
8282+ /* We can't check for !data here as a value of 0 is still valid. */
8383 error_setg(errp, "Both data and data-len must be specified");
8484 return;
8585 } else if (s->data_len > 8) {
+1-1
hw/core/qdev-properties.c
···711711712712 /*
713713 * Catch "invalid" device reference from vfio-pci and allow the
714714- * default buffer representing the non-existant device to be used.
714714+ * default buffer representing the non-existent device to be used.
715715 */
716716 if (~addr->domain || ~addr->bus || ~addr->slot || ~addr->function) {
717717 rc = snprintf(buffer, sizeof(buffer), "%04x:%02x:%02x.%0d",
+2-2
hw/display/xlnx_dp.c
···555555 if ((width != 0) && (height != 0)) {
556556 /*
557557 * As dpy_gfx_replace_surface calls qemu_free_displaysurface on the
558558- * surface we need to be carefull and don't free the surface associated
558558+ * surface we need to be careful and don't free the surface associated
559559 * to the console or double free will happen.
560560 */
561561 if (s->bout_plane.surface != current_console_surface) {
···11601160 */
11611161 if (!xlnx_dpdma_start_operation(s->dpdma, 3, false)) {
11621162 /*
11631163- * An error occured don't do anything with the data..
11631163+ * An error occurred don't do anything with the data..
11641164 * Trigger an underflow interrupt.
11651165 */
11661166 s->core_registers[DP_INT_STATUS] |= (1 << 21);
+1-1
hw/i386/pc.c
···1777177717781778/* returns pointer to CPUArchId descriptor that matches CPU's apic_id
17791779 * in pcms->possible_cpus->cpus, if pcms->possible_cpus->cpus has no
17801780- * entry correponding to CPU's apic_id returns NULL.
17801780+ * entry corresponding to CPU's apic_id returns NULL.
17811781 */
17821782static CPUArchId *pc_find_cpu_slot(PCMachineState *pcms, CPUState *cpu,
17831783 int *idx)
+1-1
hw/net/cadence_gem.c
···896896897897 DB_PRINT("config bufsize: %d packet size: %ld\n", rxbufsize, size);
898898899899- /* Find which queue we are targetting */
899899+ /* Find which queue we are targeting */
900900 q = get_queue_from_screen(s, rxbuf_ptr, rxbufsize);
901901902902 while (bytes_to_copy) {
+2-2
hw/net/spapr_llan.c
···105105 uint32_t add_buf_ptr, use_buf_ptr, rx_bufs;
106106 hwaddr rxq_ptr;
107107 QEMUTimer *rxp_timer;
108108- uint32_t compat_flags; /* Compatability flags for migration */
108108+ uint32_t compat_flags; /* Compatibility flags for migration */
109109 RxBufPool *rx_pool[RX_MAX_POOLS]; /* Receive buffer descriptor pools */
110110} VIOsPAPRVLANDevice;
111111···559559 if (pool < 0) {
560560 /*
561561 * No matching pool found? Try to use a new one. If the guest used all
562562- * pools before, but changed the size of one pool inbetween, we might
562562+ * pools before, but changed the size of one pool in the meantime, we might
563563 * need to recycle that pool here (if it's empty already). Thus scan
564564 * all buffer pools now, starting with the last (likely empty) one.
565565 */
+1-1
hw/ppc/spapr_drc.c
···5959 trace_spapr_drc_set_isolation_state(get_index(drc), state);
60606161 if (state == SPAPR_DR_ISOLATION_STATE_UNISOLATED) {
6262- /* cannot unisolate a non-existant resource, and, or resources
6262+ /* cannot unisolate a non-existent resource, and, or resources
6363 * which are in an 'UNUSABLE' allocation state. (PAPR 2.7, 13.5.3.5)
6464 */
6565 if (!drc->dev ||
+2-2
hw/s390x/s390-pci-bus.h
···183183 * may enter an error state
184184 * blocked: ignore all DMA and interrupts; transition back to enabled or from
185185 * error state via mpcifc
186186- * error: an error occured; transition back to enabled via mpcifc
187187- * permanent error: an unrecoverable error occured; transition to standby via
186186+ * error: an error occurred; transition back to enabled via mpcifc
187187+ * permanent error: an unrecoverable error occurred; transition to standby via
188188 * sclp deconfigure
189189 */
190190typedef enum {
+1-1
hw/usb/dev-mtp.c
···10931093 }
10941094 break;
10951095 case PROP_PERSISTENT_UNIQUE_OBJECT_IDENTIFIER:
10961096- /* Should be persistant between sessions,
10961096+ /* Should be persistent between sessions,
10971097 * but using our objedt ID is "good enough"
10981098 * for now */
10991099 usb_mtp_add_u64(d, 0x0000000000000000);
+1-1
hw/vfio/pci-quirks.c
···11711171 * IGD LPC/ISA bridge support code. The vBIOS needs this, but we can't write
11721172 * arbitrary values into just any bridge, so we must create our own. We try
11731173 * to handle if the user has created it for us, which they might want to do
11741174- * to enable multifuction so we don't occupy the whole PCI slot.
11741174+ * to enable multifunction so we don't occupy the whole PCI slot.
11751175 */
11761176static void vfio_pci_igd_lpc_bridge_realize(PCIDevice *pdev, Error **errp)
11771177{
+1-1
hw/virtio/virtio-crypto.c
···786786 vcrypto->max_queues = MAX(vcrypto->cryptodev->conf.peers.queues, 1);
787787 if (vcrypto->max_queues + 1 > VIRTIO_QUEUE_MAX) {
788788 error_setg(errp, "Invalid number of queues (= %" PRIu32 "), "
789789- "must be a postive integer less than %d.",
789789+ "must be a positive integer less than %d.",
790790 vcrypto->max_queues, VIRTIO_QUEUE_MAX);
791791 return;
792792 }