Skip to content

Commit ef90fb8

Browse files
committed
Fix typos
git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@208841 91177308-0d34-0410-b5e6-96231b3b80d8
1 parent 6ff852f commit ef90fb8

32 files changed

+47
-47
lines changed

README.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ long double _Complex __divtc3(long double a, long double b,
198198

199199
// __clear_cache() is used to tell process that new instructions have been
200200
// written to an address range. Necessary on processors that do not have
201-
// a unified instuction and data cache.
201+
// a unified instruction and data cache.
202202
void __clear_cache(void* start, void* end);
203203

204204
// __enable_execute_stack() is used with nested functions when a trampoline

SDKs/darwin/usr/include/stdio.h

+3-3
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ typedef __SIZE_TYPE__ size_t;
3939
# define __FOPEN_NAME "_fopen"
4040
# define __FWRITE_NAME "_fwrite"
4141
# else
42-
# error "unrecognized architecture for targetting OS X"
42+
# error "unrecognized architecture for targeting OS X"
4343
# endif
4444
#elif defined(__ENVIRONMENT_IPHONE_OS_VERSION_MIN_REQUIRED__)
4545
# if defined(__i386) || defined (__x86_64)
@@ -51,10 +51,10 @@ typedef __SIZE_TYPE__ size_t;
5151
# define __FOPEN_NAME "_fopen"
5252
# define __FWRITE_NAME "_fwrite"
5353
# else
54-
# error "unrecognized architecture for targetting iOS"
54+
# error "unrecognized architecture for targeting iOS"
5555
# endif
5656
#else
57-
# error "unrecognized architecture for targetting Darwin"
57+
# error "unrecognized architecture for targeting Darwin"
5858
#endif
5959

6060
# define stderr __stderrp

SDKs/darwin/usr/include/string.h

+3-3
Original file line numberDiff line numberDiff line change
@@ -35,16 +35,16 @@ char *strncpy(char *, const char *, size_t);
3535
# elif defined(__x86_64__) || defined(__arm)
3636
# define __STRERROR_NAME "_strerror"
3737
# else
38-
# error "unrecognized architecture for targetting OS X"
38+
# error "unrecognized architecture for targeting OS X"
3939
# endif
4040
#elif defined(__ENVIRONMENT_IPHONE_OS_VERSION_MIN_REQUIRED__)
4141
# if defined(__i386) || defined (__x86_64) || defined(__arm)
4242
# define __STRERROR_NAME "_strerror"
4343
# else
44-
# error "unrecognized architecture for targetting iOS"
44+
# error "unrecognized architecture for targeting iOS"
4545
# endif
4646
#else
47-
# error "unrecognized architecture for targetting Darwin"
47+
# error "unrecognized architecture for targeting Darwin"
4848
#endif
4949

5050
char *strerror(int) __asm(__STRERROR_NAME);

SDKs/darwin/usr/include/sys/fcntl.h

+4-4
Original file line numberDiff line numberDiff line change
@@ -26,26 +26,26 @@
2626
# elif defined(__arm)
2727
# define __OPEN_NAME "_open"
2828
# else
29-
# error "unrecognized architecture for targetting OS X"
29+
# error "unrecognized architecture for targeting OS X"
3030
# endif
3131
#elif defined(__ENVIRONMENT_IPHONE_OS_VERSION_MIN_REQUIRED__)
3232
# if defined(__i386) || defined (__x86_64)
3333
# define __OPEN_NAME "_open"
3434
# elif defined(__arm)
3535
# define __OPEN_NAME "_open"
3636
# else
37-
# error "unrecognized architecture for targetting iOS"
37+
# error "unrecognized architecture for targeting iOS"
3838
# endif
3939
#else
40-
# error "unrecognized architecture for targetting Darwin"
40+
# error "unrecognized architecture for targeting Darwin"
4141
#endif
4242

4343
#define O_RDONLY 0x0000 /* open for reading only */
4444
#define O_WRONLY 0x0001 /* open for writing only */
4545
#define O_RDWR 0x0002 /* open for reading and writing */
4646
#define O_ACCMODE 0x0003 /* mask for above modes */
4747

48-
#define O_CREAT 0x0200 /* create if nonexistant */
48+
#define O_CREAT 0x0200 /* create if nonexistent */
4949

5050
int open(const char *, int, ...) __asm(__OPEN_NAME);
5151

lib/asan/asan_interface_internal.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ using __sanitizer::uptr;
2222
extern "C" {
2323
// This function should be called at the very beginning of the process,
2424
// before any instrumented code is executed and before any call to malloc.
25-
// Everytime the asan ABI changes we also change the version number in this
25+
// Every time the asan ABI changes we also change the version number in this
2626
// name. Objects build with incompatible asan ABI version
2727
// will not link with run-time.
2828
// Changes between ABI versions:

lib/asan/asan_internal.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@
5959

6060
// All internal functions in asan reside inside the __asan namespace
6161
// to avoid namespace collisions with the user programs.
62-
// Seperate namespace also makes it simpler to distinguish the asan run-time
62+
// Separate namespace also makes it simpler to distinguish the asan run-time
6363
// functions from the instrumented user code in a profile.
6464
namespace __asan {
6565

@@ -98,7 +98,7 @@ void AppendToErrorMessageBuffer(const char *buffer);
9898

9999
void ParseExtraActivationFlags();
100100

101-
// Platfrom-specific options.
101+
// Platform-specific options.
102102
#if SANITIZER_MAC
103103
bool PlatformHasDifferentMemcpyAndMemmove();
104104
# define PLATFORM_HAS_DIFFERENT_MEMCPY_AND_MEMMOVE \

lib/asan/asan_rtl.cc

+2-2
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ static const char *MaybeCallAsanDefaultOptions() {
8080
return (&__asan_default_options) ? __asan_default_options() : "";
8181
}
8282

83-
static const char *MaybeUseAsanDefaultOptionsCompileDefiniton() {
83+
static const char *MaybeUseAsanDefaultOptionsCompileDefinition() {
8484
#ifdef ASAN_DEFAULT_OPTIONS
8585
// Stringize the macro value.
8686
# define ASAN_STRINGIZE(x) #x
@@ -281,7 +281,7 @@ void InitializeFlags(Flags *f, const char *env) {
281281
f->detect_container_overflow = true;
282282

283283
// Override from compile definition.
284-
ParseFlagsFromString(f, MaybeUseAsanDefaultOptionsCompileDefiniton());
284+
ParseFlagsFromString(f, MaybeUseAsanDefaultOptionsCompileDefinition());
285285

286286
// Override from user-specified string.
287287
ParseFlagsFromString(f, MaybeCallAsanDefaultOptions());

lib/asan/asan_thread.cc

+1-1
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ FakeStack *AsanThread::AsyncSignalSafeLazyInitFakeStack() {
123123
// 1 -- being initialized
124124
// ptr -- initialized
125125
// This CAS checks if the state was 0 and if so changes it to state 1,
126-
// if that was successfull, it initilizes the pointer.
126+
// if that was successful, it initializes the pointer.
127127
if (atomic_compare_exchange_strong(
128128
reinterpret_cast<atomic_uintptr_t *>(&fake_stack_), &old_val, 1UL,
129129
memory_order_relaxed)) {

lib/builtins/adddf3.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ __adddf3(fp_t a, fp_t b) {
101101
// If a == -b, return +zero.
102102
if (aSignificand == 0) return fromRep(0);
103103

104-
// If partial cancellation occured, we need to left-shift the result
104+
// If partial cancellation occurred, we need to left-shift the result
105105
// and adjust the exponent:
106106
if (aSignificand < implicitBit << 3) {
107107
const int shift = rep_clz(aSignificand) - rep_clz(implicitBit << 3);

lib/builtins/addsf3.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ __addsf3(fp_t a, fp_t b) {
101101
// If a == -b, return +zero.
102102
if (aSignificand == 0) return fromRep(0);
103103

104-
// If partial cancellation occured, we need to left-shift the result
104+
// If partial cancellation occurred, we need to left-shift the result
105105
// and adjust the exponent:
106106
if (aSignificand < implicitBit << 3) {
107107
const int shift = rep_clz(aSignificand) - rep_clz(implicitBit << 3);

lib/builtins/arm/comparesf2.S

+1-1
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ DEFINE_COMPILERRT_FUNCTION_ALIAS(__nesf2, __eqsf2)
107107

108108
.p2align 2
109109
DEFINE_COMPILERRT_FUNCTION(__gtsf2)
110-
// Identical to the preceeding except in that we return -1 for NaN values.
110+
// Identical to the preceding except in that we return -1 for NaN values.
111111
// Given that the two paths share so much code, one might be tempted to
112112
// unify them; however, the extra code needed to do so makes the code size
113113
// to performance tradeoff very hard to justify for such small functions.

lib/builtins/comparedf2.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ __unorddf2(fp_t a, fp_t b) {
117117
return aAbs > infRep || bAbs > infRep;
118118
}
119119

120-
// The following are alternative names for the preceeding routines.
120+
// The following are alternative names for the preceding routines.
121121

122122
COMPILER_RT_ABI enum LE_RESULT
123123
__eqdf2(fp_t a, fp_t b) {

lib/builtins/comparesf2.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ __unordsf2(fp_t a, fp_t b) {
117117
return aAbs > infRep || bAbs > infRep;
118118
}
119119

120-
// The following are alternative names for the preceeding routines.
120+
// The following are alternative names for the preceding routines.
121121

122122
COMPILER_RT_ABI enum LE_RESULT
123123
__eqsf2(fp_t a, fp_t b) {

lib/builtins/comparetf2.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ COMPILER_RT_ABI int __unordtf2(fp_t a, fp_t b) {
112112
return aAbs > infRep || bAbs > infRep;
113113
}
114114

115-
// The following are alternative names for the preceeding routines.
115+
// The following are alternative names for the preceding routines.
116116

117117
COMPILER_RT_ABI enum LE_RESULT __eqtf2(fp_t a, fp_t b) {
118118
return __letf2(a, b);

lib/builtins/divdf3.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ __divdf3(fp_t a, fp_t b) {
9898
correction32 = -((uint64_t)recip32 * q31b >> 32);
9999
recip32 = (uint64_t)recip32 * correction32 >> 31;
100100

101-
// recip32 might have overflowed to exactly zero in the preceeding
101+
// recip32 might have overflowed to exactly zero in the preceding
102102
// computation if the high word of b is exactly 1.0. This would sabotage
103103
// the full-width final stage of the computation that follows, so we adjust
104104
// recip32 downward by one bit.

lib/builtins/ppc/fixtfdi.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ uint64_t __fixtfdi(long double input)
2525

2626
int64_t result = hibits.x & INT64_C(0x000fffffffffffff); /* mantissa(hi) */
2727
result |= INT64_C(0x0010000000000000); /* matissa(hi) with implicit bit */
28-
result <<= 10; /* mantissa(hi) with one zero preceeding bit. */
28+
result <<= 10; /* mantissa(hi) with one zero preceding bit. */
2929

3030
const int64_t hiNegationMask = ((int64_t)(hibits.x)) >> 63;
3131

lib/profile/InstrProfilingPlatformOther.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/*===- InstrProfilingPlatformOther.c - Profile data default platfrom ------===*\
1+
/*===- InstrProfilingPlatformOther.c - Profile data default platform ------===*\
22
|*
33
|* The LLVM Compiler Infrastructure
44
|*

lib/sanitizer_common/sanitizer_addrhashmap.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@
2222
namespace __sanitizer {
2323

2424
// Concurrent uptr->T hashmap.
25-
// T must be a POD type, kSize is preferrably a prime but can be any number.
25+
// T must be a POD type, kSize is preferably a prime but can be any number.
2626
// Usage example:
2727
//
2828
// typedef AddrHashMap<uptr, 11> Map;

lib/sanitizer_common/sanitizer_tls_get_addr.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ struct DTLS {
4343
uptr dtv_size;
4444
DTV *dtv; // dtv_size elements, allocated by MmapOrDie.
4545

46-
// Auxilary fields, don't access them outside sanitizer_tls_get_addr.cc
46+
// Auxiliary fields, don't access them outside sanitizer_tls_get_addr.cc
4747
uptr last_memalign_size;
4848
uptr last_memalign_ptr;
4949
};

lib/sanitizer_common/scripts/cpplint.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -3634,7 +3634,7 @@ def UpdateIncludeState(filename, include_state, io=codecs):
36343634
io: The io factory to use to read the file. Provided for testability.
36353635
36363636
Returns:
3637-
True if a header was succesfully added. False otherwise.
3637+
True if a header was successfully added. False otherwise.
36383638
"""
36393639
headerfile = None
36403640
try:
@@ -3706,7 +3706,7 @@ def CheckForIncludeWhatYouUse(filename, clean_lines, include_state, error,
37063706
# Let's copy the include_state so it is only messed up within this function.
37073707
include_state = include_state.copy()
37083708

3709-
# Did we find the header for this file (if any) and succesfully load it?
3709+
# Did we find the header for this file (if any) and successfully load it?
37103710
header_found = False
37113711

37123712
# Use the absolute path so that matching works properly.

lib/tsan/rtl/tsan_flags.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,10 @@ namespace __tsan {
2222
struct Flags : CommonFlags, DDFlags {
2323
// Enable dynamic annotations, otherwise they are no-ops.
2424
bool enable_annotations;
25-
// Supress a race report if we've already output another race report
25+
// Suppress a race report if we've already output another race report
2626
// with the same stack.
2727
bool suppress_equal_stacks;
28-
// Supress a race report if we've already output another race report
28+
// Suppress a race report if we've already output another race report
2929
// on the same address.
3030
bool suppress_equal_addresses;
3131
// Suppress weird race reports that can be seen if JVM is embed

lib/tsan/rtl/tsan_interface_atomic.cc

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
//===----------------------------------------------------------------------===//
1313

1414
// ThreadSanitizer atomic operations are based on C++11/C1x standards.
15-
// For background see C++11 standard. A slightly older, publically
15+
// For background see C++11 standard. A slightly older, publicly
1616
// available draft of the standard (not entirely up-to-date, but close enough
1717
// for casual browsing) is available here:
1818
// http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2011/n3242.pdf

lib/tsan/tests/rtl/tsan_test_util.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ class Mutex {
3737
~Mutex();
3838

3939
void Init();
40-
void StaticInit(); // Emulates static initalization (tsan invisible).
40+
void StaticInit(); // Emulates static initialization (tsan invisible).
4141
void Destroy();
4242
void Lock();
4343
bool TryLock();

make/platform/clang_darwin.mk

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# These are the functions which clang needs when it is targetting a previous
1+
# These are the functions which clang needs when it is targeting a previous
22
# version of the OS. The issue is that the backend may use functions which were
33
# not present in the libgcc that shipped on the platform. In such cases, we link
44
# with a version of the library which contains private_extern definitions of all
@@ -62,18 +62,18 @@ UniversalArchs :=
6262
Configs += eprintf
6363
UniversalArchs.eprintf := $(call CheckArches,i386,eprintf)
6464

65-
# Configuration for targetting 10.4. We need a few functions missing from
65+
# Configuration for targeting 10.4. We need a few functions missing from
6666
# libgcc_s.10.4.dylib. We only build x86 slices since clang doesn't really
67-
# support targetting PowerPC.
67+
# support targeting PowerPC.
6868
Configs += 10.4
6969
UniversalArchs.10.4 := $(call CheckArches,i386 x86_64,10.4)
7070

71-
# Configuration for targetting iOS for a couple of functions that didn't
71+
# Configuration for targeting iOS for a couple of functions that didn't
7272
# make it into libSystem.
7373
Configs += ios
7474
UniversalArchs.ios := $(call CheckArches,i386 x86_64 x86_64h armv7,ios)
7575

76-
# Configuration for targetting OSX. These functions may not be in libSystem
76+
# Configuration for targeting OSX. These functions may not be in libSystem
7777
# so we should provide our own.
7878
Configs += osx
7979
UniversalArchs.osx := $(call CheckArches,i386 x86_64 x86_64h,osx)

make/platform/clang_macho_embedded.mk

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# These are the functions which clang needs when it is targetting a previous
1+
# These are the functions which clang needs when it is targeting a previous
22
# version of the OS. The issue is that the backend may use functions which were
33
# not present in the libgcc that shipped on the platform. In such cases, we link
44
# with a version of the library which contains private_extern definitions of all

make/platform/darwin_fat.mk

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
# software floating point).
99
#
1010
# This section must define one of:
11-
# UniveralArchs - A list of architectures to build for, when using universal build
11+
# UniversalArchs - A list of architectures to build for, when using universal build
1212
# support (e.g., on Darwin). This should only be used to build fat
1313
# libraries, simply building multiple libraries for different
1414
# architectures should do so using distinct configs, with the

test/asan/TestCases/Darwin/interface_symbols_darwin.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
// Check the presense of interface symbols in the ASan runtime dylib.
1+
// Check the presence of interface symbols in the ASan runtime dylib.
22
// If you're changing this file, please also change
33
// ../Linux/interface_symbols.c
44

test/asan/TestCases/Linux/interface_symbols_linux.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
// Check the presense of interface symbols in compiled file.
1+
// Check the presence of interface symbols in compiled file.
22

33
// RUN: %clang_asan -O2 %s -o %t.exe
44
// RUN: nm -D %t.exe | grep " T " | sed "s/.* T //" \

test/asan/TestCases/Linux/malloc-in-qsort.cc

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
// (i.e. if we can unwind through a function compiled w/o frame pointers).
77
// https://code.google.com/p/address-sanitizer/issues/detail?id=137
88

9-
// Fast unwinder is only avaliable on x86_64 and i386.
9+
// Fast unwinder is only available on x86_64 and i386.
1010
// REQUIRES: x86_64-supported-target
1111

1212
// REQUIRES: compiler-rt-optimized

test/asan/TestCases/Linux/overflow-in-qsort.cc

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
// (i.e. if we can unwind through a function compiled w/o frame pointers).
77
// https://code.google.com/p/address-sanitizer/issues/detail?id=137
88

9-
// Fast unwinder is only avaliable on x86_64 and i386.
9+
// Fast unwinder is only available on x86_64 and i386.
1010
// REQUIRES: x86_64-supported-target
1111

1212
#include <stdlib.h>

test/profile/instrprof-write-file-only.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ int main(int argc, const char *argv[]) {
2121
}
2222
int foo(int X) {
2323
// There should be no profiling information for @foo, since it was called
24-
// after the profile was written (and the atexit was supressed by defining
24+
// after the profile was written (and the atexit was suppressed by defining
2525
// profile_runtime).
2626
// CHECK-LABEL: define i32 @foo
2727
// CHECK: br i1 %{{.*}}, label %{{.*}}, label %{{[^,]+$}}

test/tsan/allocator_returns_null.cc

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
// Test the behavior of malloc/calloc/realloc when the allocation size is huge.
2-
// By default (allocator_may_return_null=0) the process shoudl crash.
2+
// By default (allocator_may_return_null=0) the process should crash.
33
// With allocator_may_return_null=1 the allocator should return 0.
44
//
55
// RUN: %clangxx_tsan -O0 %s -o %t

0 commit comments

Comments
 (0)