Index: virsh.1 =================================================================== RCS file: /data/cvs/libvirt/virsh.1,v retrieving revision 1.12 diff -u -r1.12 virsh.1 --- virsh.1 14 Mar 2008 11:08:03 -0000 1.12 +++ virsh.1 17 Mar 2008 02:20:55 -0000 @@ -219,7 +219,7 @@ this is used to connect to the local Xen hypervisor, this is the default .IP "qemu:///system" 4 .IX Item "qemu:///system" -allow to connect locally as root to the daemon supervizing QEmu and \s-1KVM\s0 domains +allow to connect locally as root to the daemon supervising QEmu and \s-1KVM\s0 domains .IP "qemu:///session" 4 .IX Item "qemu:///session" allow to connect locally as a normal user to the his own set of QEmu and \s-1KVM\s0 domains Index: docs/FAQ.html =================================================================== RCS file: /data/cvs/libvirt/docs/FAQ.html,v retrieving revision 1.41 diff -u -r1.41 FAQ.html --- docs/FAQ.html 20 Feb 2008 15:58:06 -0000 1.41 +++ docs/FAQ.html 17 Mar 2008 02:20:55 -0000 @@ -14,7 +14,7 @@

Yes. The LGPL allows you to embed libvirt into a proprietary application. It would be graceful to send-back bug fixes and improvements as patches for possible incorporation in the main development tree. It - will decrease your maintainance costs anyway if you do so.

+ will decrease your maintenance costs anyway if you do so.

Installation

  1. Where can I get libvirt ?

    The original distribution comes from ftp://libvirt.org/libvirt/.

    @@ -34,8 +34,8 @@

    make rpm

  2. Failure to use the API for non-root users -

    Large parts of the API may only be accessible with root priviledges, - however the read only access to the xenstore data doesnot have to be +

    Large parts of the API may only be accessible with root privileges, + however the read only access to the xenstore data doesn't have to be forbidden to user, at least for monitoring purposes. If "virsh dominfo" fails to run as an user, change the mode of the xenstore read-only socket with:

    Index: docs/architecture.html =================================================================== RCS file: /data/cvs/libvirt/docs/architecture.html,v retrieving revision 1.42 diff -u -r1.42 architecture.html --- docs/architecture.html 14 Mar 2008 11:08:03 -0000 1.42 +++ docs/architecture.html 17 Mar 2008 02:20:55 -0000 @@ -14,7 +14,7 @@ drivers, kernels and daemons communicate though a shared system bus implemented in the hypervisor. The figure below tries to provide a view of this environment:

    The Xen architecture

    The library can be initialized in 2 ways depending on the level of -priviledge of the embedding program. If it runs with root access, +privilege of the embedding program. If it runs with root access, virConnectOpen() can be used, it will use three different ways to connect to the Xen infrastructure:

@@ -2912,11 +2912,11 @@

Server configuration

-The libvirt daemon allows the adminstrator to choose the authentication -mechanisms used for client connections on each network socket independantly. +The libvirt daemon allows the administrator to choose the authentication +mechanisms used for client connections on each network socket independently. This is primarily controlled via the libvirt daemon master config file in /etc/libvirt/libvirtd.conf. Each of the libvirt sockets can -have its authentication mechanism configured independantly. There is +have its authentication mechanism configured independently. There is currently a choice of none, polkit, and sasl. The SASL scheme can be further configured to choose between a large number of different mechanisms. @@ -2957,7 +2957,7 @@

-The default policy can be overriden by the adminstrator using the PolicyKit +The default policy can be overriden by the administrator using the PolicyKit master configuration file in /etc/PolicyKit/PolicyKit.conf. The PolicyKit.conf(5) manual page provides details on the syntax available. The two libvirt daemon actions available are named org.libvirt.unix.monitor @@ -3040,7 +3040,7 @@

Some operating systems do not install the SASL kerberos plugin by default. It -may be neccessary to install a sub-package such as cyrus-sasl-gssapi. +may be necessary to install a sub-package such as cyrus-sasl-gssapi. To check whether the Kerberos plugin is installed run the pluginviewer program and verify that gssapi is listed,eg:

@@ -3055,7 +3055,7 @@

-Next is is neccessary for the adminsitrator of the Kerberos realm to issue a principle +Next is is necessary for the adminsitrator of the Kerberos realm to issue a principle for the libvirt server. There needs to be one principle per host running the libvirt daemon. The principle should be named libvirt/full.hostname@KERBEROS.REALM. This is typically done by running the kadmin.local command on the Kerberos Index: docs/libvirt-api.xml =================================================================== RCS file: /data/cvs/libvirt/docs/libvirt-api.xml,v retrieving revision 1.45 diff -u -r1.45 libvirt-api.xml --- docs/libvirt-api.xml 14 Mar 2008 11:08:03 -0000 1.45 +++ docs/libvirt-api.xml 17 Mar 2008 02:20:57 -0000 @@ -527,7 +527,7 @@ - + @@ -700,7 +700,7 @@ - Get the version level of the Hypervisor running. This may work only with hypervisor call, i.e. with priviledged access to the hypervisor, not with a Read-Only connection. + Get the version level of the Hypervisor running. This may work only with hypervisor call, i.e. with privileged access to the hypervisor, not with a Read-Only connection. @@ -783,14 +783,14 @@ - This function should be called first to get a connection to the Hypervisor. If neccessary, authentication will be performed fetching credentials via the callback + This function should be called first to get a connection to the Hypervisor. If necessary, authentication will be performed fetching credentials via the callback - This function should be called first to get a restricted connection to the libbrary functionalities. The set of APIs usable are then restricted on the available methods to control the domains. + This function should be called first to get a restricted connection to the library functionalities. The set of APIs usable are then restricted on the available methods to control the domains. @@ -831,7 +831,7 @@ - Launch a new Linux guest domain, based on an XML description similar to the one returned by virDomainGetXMLDesc() This function may requires priviledged access to the hypervisor. + Launch a new Linux guest domain, based on an XML description similar to the one returned by virDomainGetXMLDesc() This function may requires riviledged access to the hypervisor. @@ -844,7 +844,7 @@ - Destroy the domain object. The running instance is shutdown if not down already and all resources used by it are given back to the hypervisor. The data structure is freed and should not be used thereafter if the call does not return an error. This function may requires priviledged access + Destroy the domain object. The running instance is shutdown if not down already and all resources used by it are given back to the hypervisor. The data structure is freed and should not be used thereafter if the call does not return an error. This function may requires privileged access @@ -984,7 +984,7 @@ - Dynamically change the real CPUs which can be allocated to a virtual CPU. This function requires priviledged access to the hypervisor. + Dynamically change the real CPUs which can be allocated to a virtual CPU. This function requires privileged access to the hypervisor. @@ -1004,7 +1004,7 @@ - Resume an suspended domain, the process is restarted from the state where it was frozen by calling virSuspendDomain(). This function may requires priviledged access + Resume an suspended domain, the process is restarted from the state where it was frozen by calling virSuspendDomain(). This function may requires privileged access @@ -1021,13 +1021,13 @@ - Dynamically change the maximum amount of physical memory allocated to a domain. If domain is NULL, then this change the amount of memory reserved to Domain0 i.e. the domain where the application runs. This function requires priviledged access to the hypervisor. + Dynamically change the maximum amount of physical memory allocated to a domain. If domain is NULL, then this change the amount of memory reserved to Domain0 i.e. the domain where the application runs. This function requires privileged access to the hypervisor. - Dynamically change the target amount of physical memory allocated to a domain. If domain is NULL, then this change the amount of memory reserved to Domain0 i.e. the domain where the application runs. This function may requires priviledged access to the hypervisor. + Dynamically change the target amount of physical memory allocated to a domain. If domain is NULL, then this change the amount of memory reserved to Domain0 i.e. the domain where the application runs. This function may requires privileged access to the hypervisor. @@ -1040,7 +1040,7 @@ - Dynamically change the number of virtual CPUs used by the domain. Note that this call may fail if the underlying virtualization hypervisor does not support it or if growing the number is arbitrary limited. This function requires priviledged access to the hypervisor. + Dynamically change the number of virtual CPUs used by the domain. Note that this call may fail if the underlying virtualization hypervisor does not support it or if growing the number is arbitrary limited. This function requires privileged access to the hypervisor. @@ -1051,7 +1051,7 @@ - Suspends an active domain, the process is frozen without further access to CPU resources and I/O but the memory used by the domain at the hypervisor level will stay allocated. Use virDomainResume() to reactivate the domain. This function may requires priviledged access. + Suspends an active domain, the process is frozen without further access to CPU resources and I/O but the memory used by the domain at the hypervisor level will stay allocated. Use virDomainResume() to reactivate the domain. This function may requires privileged access. @@ -1099,7 +1099,7 @@ - Destroy the network object. The running instance is shutdown if not down already and all resources used by it are given back to the hypervisor. The data structure is freed and should not be used thereafter if the call does not return an error. This function may requires priviledged access + Destroy the network object. The running instance is shutdown if not down already and all resources used by it are given back to the hypervisor. The data structure is freed and should not be used thereafter if the call does not return an error. This function may requires privileged access @@ -1223,7 +1223,7 @@ - Create a new storage based on its XML description. The pool is not persitent, so its definition will disappear when it is destroyed, or if the host is restarted + Create a new storage based on its XML description. The pool is not persistent, so its definition will disappear when it is destroyed, or if the host is restarted @@ -1261,7 +1261,7 @@ Provides the connection pointer associated with a storage pool. The reference counter on the connection is not increased by this call. WARNING: When writing libvirt bindings in other languages, do not use this function. Instead, store the connection and the pool object together. - + Get volatile information about the storage pool such as free space / usage summary @@ -1365,7 +1365,7 @@ Provides the connection pointer associated with a storage volume. The reference counter on the connection is not increased by this call. WARNING: When writing libvirt bindings in other languages, do not use this function. Instead, store the connection and the volume object together. - + Fetches volatile information about the storage volume such as its current allocation @@ -1374,7 +1374,7 @@ - Fetch the storage volume key. This is globally unique, so the same volume will hve the same key no matter what host it is accessed from + Fetch the storage volume key. This is globally unique, so the same volume will have the same key no matter what host it is accessed from Index: docs/libvirt-refs.xml =================================================================== RCS file: /data/cvs/libvirt/docs/libvirt-refs.xml,v retrieving revision 1.41 diff -u -r1.41 libvirt-refs.xml --- docs/libvirt-refs.xml 3 Mar 2008 06:18:06 -0000 1.41 +++ docs/libvirt-refs.xml 17 Mar 2008 02:20:59 -0000 @@ -3044,7 +3044,7 @@ - + @@ -3592,7 +3592,7 @@ - + @@ -3656,7 +3656,7 @@ - + @@ -3837,7 +3837,7 @@ - + @@ -3860,7 +3860,7 @@ - + Index: docs/news.html =================================================================== RCS file: /data/cvs/libvirt/docs/news.html,v retrieving revision 1.67 diff -u -r1.67 news.html --- docs/news.html 14 Mar 2008 11:08:03 -0000 1.67 +++ docs/news.html 17 Mar 2008 02:20:59 -0000 @@ -417,7 +417,7 @@ support for fully virtualized guest (Jim Fehlig, DV, Mark McLoughlin)

  • documentation: augmented to cover hvm domains
  • 0.1.2: Jul 3 2006

    0.1.1: Jun 21 2006