[compiler-rt] r208841 - Fix typos

Alp Toker alp at nuanti.com
Wed May 14 19:40:41 PDT 2014


I noticed the typo "preceeding" shows up frequently in this module.

This commit attempts to correct those to "preceding" or "proceding" 
based on context.

Module maintainers, please check over the changes and consider using 
clearer wording such as "previous" and "following" as the distinction is 
significant.

Cheers,
Alp.


On 15/05/2014 05:22, Alp Toker wrote:
> Author: alp
> Date: Wed May 14 21:22:34 2014
> New Revision: 208841
>
> URL: http://llvm.org/viewvc/llvm-project?rev=208841&view=rev
> Log:
> Fix typos
>
> Modified:
>      compiler-rt/trunk/README.txt
>      compiler-rt/trunk/SDKs/darwin/usr/include/stdio.h
>      compiler-rt/trunk/SDKs/darwin/usr/include/string.h
>      compiler-rt/trunk/SDKs/darwin/usr/include/sys/fcntl.h
>      compiler-rt/trunk/lib/asan/asan_interface_internal.h
>      compiler-rt/trunk/lib/asan/asan_internal.h
>      compiler-rt/trunk/lib/asan/asan_rtl.cc
>      compiler-rt/trunk/lib/asan/asan_thread.cc
>      compiler-rt/trunk/lib/builtins/adddf3.c
>      compiler-rt/trunk/lib/builtins/addsf3.c
>      compiler-rt/trunk/lib/builtins/arm/comparesf2.S
>      compiler-rt/trunk/lib/builtins/comparedf2.c
>      compiler-rt/trunk/lib/builtins/comparesf2.c
>      compiler-rt/trunk/lib/builtins/comparetf2.c
>      compiler-rt/trunk/lib/builtins/divdf3.c
>      compiler-rt/trunk/lib/builtins/ppc/fixtfdi.c
>      compiler-rt/trunk/lib/profile/InstrProfilingPlatformOther.c
>      compiler-rt/trunk/lib/sanitizer_common/sanitizer_addrhashmap.h
>      compiler-rt/trunk/lib/sanitizer_common/sanitizer_tls_get_addr.h
>      compiler-rt/trunk/lib/sanitizer_common/scripts/cpplint.py
>      compiler-rt/trunk/lib/tsan/rtl/tsan_flags.h
>      compiler-rt/trunk/lib/tsan/rtl/tsan_interface_atomic.cc
>      compiler-rt/trunk/lib/tsan/tests/rtl/tsan_test_util.h
>      compiler-rt/trunk/make/platform/clang_darwin.mk
>      compiler-rt/trunk/make/platform/clang_macho_embedded.mk
>      compiler-rt/trunk/make/platform/darwin_fat.mk
>      compiler-rt/trunk/test/asan/TestCases/Darwin/interface_symbols_darwin.c
>      compiler-rt/trunk/test/asan/TestCases/Linux/interface_symbols_linux.c
>      compiler-rt/trunk/test/asan/TestCases/Linux/malloc-in-qsort.cc
>      compiler-rt/trunk/test/asan/TestCases/Linux/overflow-in-qsort.cc
>      compiler-rt/trunk/test/profile/instrprof-write-file-only.c
>      compiler-rt/trunk/test/tsan/allocator_returns_null.cc
>
> Modified: compiler-rt/trunk/README.txt
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/README.txt?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/README.txt (original)
> +++ compiler-rt/trunk/README.txt Wed May 14 21:22:34 2014
> @@ -198,7 +198,7 @@ long double _Complex __divtc3(long doubl
>   
>   // __clear_cache() is used to tell process that new instructions have been
>   // written to an address range.  Necessary on processors that do not have
> -// a unified instuction and data cache.
> +// a unified instruction and data cache.
>   void __clear_cache(void* start, void* end);
>   
>   // __enable_execute_stack() is used with nested functions when a trampoline
>
> Modified: compiler-rt/trunk/SDKs/darwin/usr/include/stdio.h
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/SDKs/darwin/usr/include/stdio.h?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/SDKs/darwin/usr/include/stdio.h (original)
> +++ compiler-rt/trunk/SDKs/darwin/usr/include/stdio.h Wed May 14 21:22:34 2014
> @@ -39,7 +39,7 @@ typedef __SIZE_TYPE__ size_t;
>   #    define __FOPEN_NAME "_fopen"
>   #    define __FWRITE_NAME "_fwrite"
>   #  else
> -#    error "unrecognized architecture for targetting OS X"
> +#    error "unrecognized architecture for targeting OS X"
>   #  endif
>   #elif defined(__ENVIRONMENT_IPHONE_OS_VERSION_MIN_REQUIRED__)
>   #  if defined(__i386) || defined (__x86_64)
> @@ -51,10 +51,10 @@ typedef __SIZE_TYPE__ size_t;
>   #    define __FOPEN_NAME "_fopen"
>   #    define __FWRITE_NAME "_fwrite"
>   #  else
> -#    error "unrecognized architecture for targetting iOS"
> +#    error "unrecognized architecture for targeting iOS"
>   #  endif
>   #else
> -#  error "unrecognized architecture for targetting Darwin"
> +#  error "unrecognized architecture for targeting Darwin"
>   #endif
>   
>   #    define stderr __stderrp
>
> Modified: compiler-rt/trunk/SDKs/darwin/usr/include/string.h
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/SDKs/darwin/usr/include/string.h?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/SDKs/darwin/usr/include/string.h (original)
> +++ compiler-rt/trunk/SDKs/darwin/usr/include/string.h Wed May 14 21:22:34 2014
> @@ -35,16 +35,16 @@ char *strncpy(char *, const char *, size
>   #  elif defined(__x86_64__) || defined(__arm)
>   #    define __STRERROR_NAME  "_strerror"
>   #  else
> -#    error "unrecognized architecture for targetting OS X"
> +#    error "unrecognized architecture for targeting OS X"
>   #  endif
>   #elif defined(__ENVIRONMENT_IPHONE_OS_VERSION_MIN_REQUIRED__)
>   #  if defined(__i386) || defined (__x86_64) || defined(__arm)
>   #    define __STRERROR_NAME  "_strerror"
>   #  else
> -#    error "unrecognized architecture for targetting iOS"
> +#    error "unrecognized architecture for targeting iOS"
>   #  endif
>   #else
> -#  error "unrecognized architecture for targetting Darwin"
> +#  error "unrecognized architecture for targeting Darwin"
>   #endif
>   
>   char *strerror(int) __asm(__STRERROR_NAME);
>
> Modified: compiler-rt/trunk/SDKs/darwin/usr/include/sys/fcntl.h
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/SDKs/darwin/usr/include/sys/fcntl.h?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/SDKs/darwin/usr/include/sys/fcntl.h (original)
> +++ compiler-rt/trunk/SDKs/darwin/usr/include/sys/fcntl.h Wed May 14 21:22:34 2014
> @@ -26,7 +26,7 @@
>   #  elif defined(__arm)
>   #    define __OPEN_NAME  "_open"
>   #  else
> -#    error "unrecognized architecture for targetting OS X"
> +#    error "unrecognized architecture for targeting OS X"
>   #  endif
>   #elif defined(__ENVIRONMENT_IPHONE_OS_VERSION_MIN_REQUIRED__)
>   #  if defined(__i386) || defined (__x86_64)
> @@ -34,10 +34,10 @@
>   #  elif defined(__arm)
>   #    define __OPEN_NAME  "_open"
>   #  else
> -#    error "unrecognized architecture for targetting iOS"
> +#    error "unrecognized architecture for targeting iOS"
>   #  endif
>   #else
> -#  error "unrecognized architecture for targetting Darwin"
> +#  error "unrecognized architecture for targeting Darwin"
>   #endif
>   
>   #define O_RDONLY   0x0000    /* open for reading only */
> @@ -45,7 +45,7 @@
>   #define O_RDWR     0x0002    /* open for reading and writing */
>   #define O_ACCMODE  0x0003    /* mask for above modes */
>   
> -#define O_CREAT    0x0200    /* create if nonexistant */
> +#define O_CREAT    0x0200    /* create if nonexistent */
>   
>   int open(const char *, int, ...) __asm(__OPEN_NAME);
>   
>
> Modified: compiler-rt/trunk/lib/asan/asan_interface_internal.h
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/asan/asan_interface_internal.h?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/asan/asan_interface_internal.h (original)
> +++ compiler-rt/trunk/lib/asan/asan_interface_internal.h Wed May 14 21:22:34 2014
> @@ -22,7 +22,7 @@ using __sanitizer::uptr;
>   extern "C" {
>     // This function should be called at the very beginning of the process,
>     // before any instrumented code is executed and before any call to malloc.
> -  // Everytime the asan ABI changes we also change the version number in this
> +  // Every time the asan ABI changes we also change the version number in this
>     // name. Objects build with incompatible asan ABI version
>     // will not link with run-time.
>     // Changes between ABI versions:
>
> Modified: compiler-rt/trunk/lib/asan/asan_internal.h
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/asan/asan_internal.h?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/asan/asan_internal.h (original)
> +++ compiler-rt/trunk/lib/asan/asan_internal.h Wed May 14 21:22:34 2014
> @@ -59,7 +59,7 @@
>   
>   // All internal functions in asan reside inside the __asan namespace
>   // to avoid namespace collisions with the user programs.
> -// Seperate namespace also makes it simpler to distinguish the asan run-time
> +// Separate namespace also makes it simpler to distinguish the asan run-time
>   // functions from the instrumented user code in a profile.
>   namespace __asan {
>   
> @@ -98,7 +98,7 @@ void AppendToErrorMessageBuffer(const ch
>   
>   void ParseExtraActivationFlags();
>   
> -// Platfrom-specific options.
> +// Platform-specific options.
>   #if SANITIZER_MAC
>   bool PlatformHasDifferentMemcpyAndMemmove();
>   # define PLATFORM_HAS_DIFFERENT_MEMCPY_AND_MEMMOVE \
>
> Modified: compiler-rt/trunk/lib/asan/asan_rtl.cc
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/asan/asan_rtl.cc?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/asan/asan_rtl.cc (original)
> +++ compiler-rt/trunk/lib/asan/asan_rtl.cc Wed May 14 21:22:34 2014
> @@ -80,7 +80,7 @@ static const char *MaybeCallAsanDefaultO
>     return (&__asan_default_options) ? __asan_default_options() : "";
>   }
>   
> -static const char *MaybeUseAsanDefaultOptionsCompileDefiniton() {
> +static const char *MaybeUseAsanDefaultOptionsCompileDefinition() {
>   #ifdef ASAN_DEFAULT_OPTIONS
>   // Stringize the macro value.
>   # define ASAN_STRINGIZE(x) #x
> @@ -281,7 +281,7 @@ void InitializeFlags(Flags *f, const cha
>     f->detect_container_overflow = true;
>   
>     // Override from compile definition.
> -  ParseFlagsFromString(f, MaybeUseAsanDefaultOptionsCompileDefiniton());
> +  ParseFlagsFromString(f, MaybeUseAsanDefaultOptionsCompileDefinition());
>   
>     // Override from user-specified string.
>     ParseFlagsFromString(f, MaybeCallAsanDefaultOptions());
>
> Modified: compiler-rt/trunk/lib/asan/asan_thread.cc
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/asan/asan_thread.cc?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/asan/asan_thread.cc (original)
> +++ compiler-rt/trunk/lib/asan/asan_thread.cc Wed May 14 21:22:34 2014
> @@ -123,7 +123,7 @@ FakeStack *AsanThread::AsyncSignalSafeLa
>     // 1   -- being initialized
>     // ptr -- initialized
>     // This CAS checks if the state was 0 and if so changes it to state 1,
> -  // if that was successfull, it initilizes the pointer.
> +  // if that was successful, it initializes the pointer.
>     if (atomic_compare_exchange_strong(
>         reinterpret_cast<atomic_uintptr_t *>(&fake_stack_), &old_val, 1UL,
>         memory_order_relaxed)) {
>
> Modified: compiler-rt/trunk/lib/builtins/adddf3.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/builtins/adddf3.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/builtins/adddf3.c (original)
> +++ compiler-rt/trunk/lib/builtins/adddf3.c Wed May 14 21:22:34 2014
> @@ -101,7 +101,7 @@ __adddf3(fp_t a, fp_t b) {
>           // If a == -b, return +zero.
>           if (aSignificand == 0) return fromRep(0);
>           
> -        // If partial cancellation occured, we need to left-shift the result
> +        // If partial cancellation occurred, we need to left-shift the result
>           // and adjust the exponent:
>           if (aSignificand < implicitBit << 3) {
>               const int shift = rep_clz(aSignificand) - rep_clz(implicitBit << 3);
>
> Modified: compiler-rt/trunk/lib/builtins/addsf3.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/builtins/addsf3.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/builtins/addsf3.c (original)
> +++ compiler-rt/trunk/lib/builtins/addsf3.c Wed May 14 21:22:34 2014
> @@ -101,7 +101,7 @@ __addsf3(fp_t a, fp_t b) {
>           // If a == -b, return +zero.
>           if (aSignificand == 0) return fromRep(0);
>           
> -        // If partial cancellation occured, we need to left-shift the result
> +        // If partial cancellation occurred, we need to left-shift the result
>           // and adjust the exponent:
>           if (aSignificand < implicitBit << 3) {
>               const int shift = rep_clz(aSignificand) - rep_clz(implicitBit << 3);
>
> Modified: compiler-rt/trunk/lib/builtins/arm/comparesf2.S
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/builtins/arm/comparesf2.S?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/builtins/arm/comparesf2.S (original)
> +++ compiler-rt/trunk/lib/builtins/arm/comparesf2.S Wed May 14 21:22:34 2014
> @@ -107,7 +107,7 @@ DEFINE_COMPILERRT_FUNCTION_ALIAS(__nesf2
>   
>   .p2align 2
>   DEFINE_COMPILERRT_FUNCTION(__gtsf2)
> -    // Identical to the preceeding except in that we return -1 for NaN values.
> +    // Identical to the preceding except in that we return -1 for NaN values.
>       // Given that the two paths share so much code, one might be tempted to
>       // unify them; however, the extra code needed to do so makes the code size
>       // to performance tradeoff very hard to justify for such small functions.
>
> Modified: compiler-rt/trunk/lib/builtins/comparedf2.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/builtins/comparedf2.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/builtins/comparedf2.c (original)
> +++ compiler-rt/trunk/lib/builtins/comparedf2.c Wed May 14 21:22:34 2014
> @@ -117,7 +117,7 @@ __unorddf2(fp_t a, fp_t b) {
>       return aAbs > infRep || bAbs > infRep;
>   }
>   
> -// The following are alternative names for the preceeding routines.
> +// The following are alternative names for the preceding routines.
>   
>   COMPILER_RT_ABI enum LE_RESULT
>   __eqdf2(fp_t a, fp_t b) {
>
> Modified: compiler-rt/trunk/lib/builtins/comparesf2.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/builtins/comparesf2.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/builtins/comparesf2.c (original)
> +++ compiler-rt/trunk/lib/builtins/comparesf2.c Wed May 14 21:22:34 2014
> @@ -117,7 +117,7 @@ __unordsf2(fp_t a, fp_t b) {
>       return aAbs > infRep || bAbs > infRep;
>   }
>   
> -// The following are alternative names for the preceeding routines.
> +// The following are alternative names for the preceding routines.
>   
>   COMPILER_RT_ABI enum LE_RESULT
>   __eqsf2(fp_t a, fp_t b) {
>
> Modified: compiler-rt/trunk/lib/builtins/comparetf2.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/builtins/comparetf2.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/builtins/comparetf2.c (original)
> +++ compiler-rt/trunk/lib/builtins/comparetf2.c Wed May 14 21:22:34 2014
> @@ -112,7 +112,7 @@ COMPILER_RT_ABI int __unordtf2(fp_t a, f
>       return aAbs > infRep || bAbs > infRep;
>   }
>   
> -// The following are alternative names for the preceeding routines.
> +// The following are alternative names for the preceding routines.
>   
>   COMPILER_RT_ABI enum LE_RESULT __eqtf2(fp_t a, fp_t b) {
>       return __letf2(a, b);
>
> Modified: compiler-rt/trunk/lib/builtins/divdf3.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/builtins/divdf3.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/builtins/divdf3.c (original)
> +++ compiler-rt/trunk/lib/builtins/divdf3.c Wed May 14 21:22:34 2014
> @@ -98,7 +98,7 @@ __divdf3(fp_t a, fp_t b) {
>       correction32 = -((uint64_t)recip32 * q31b >> 32);
>       recip32 = (uint64_t)recip32 * correction32 >> 31;
>       
> -    // recip32 might have overflowed to exactly zero in the preceeding
> +    // recip32 might have overflowed to exactly zero in the preceding
>       // computation if the high word of b is exactly 1.0.  This would sabotage
>       // the full-width final stage of the computation that follows, so we adjust
>       // recip32 downward by one bit.
>
> Modified: compiler-rt/trunk/lib/builtins/ppc/fixtfdi.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/builtins/ppc/fixtfdi.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/builtins/ppc/fixtfdi.c (original)
> +++ compiler-rt/trunk/lib/builtins/ppc/fixtfdi.c Wed May 14 21:22:34 2014
> @@ -25,7 +25,7 @@ uint64_t __fixtfdi(long double input)
>   		
>   		int64_t result = hibits.x & INT64_C(0x000fffffffffffff); /* mantissa(hi) */
>   		result |= INT64_C(0x0010000000000000); /* matissa(hi) with implicit bit */
> -		result <<= 10; /* mantissa(hi) with one zero preceeding bit. */
> +		result <<= 10; /* mantissa(hi) with one zero preceding bit. */
>   		
>   		const int64_t hiNegationMask = ((int64_t)(hibits.x)) >> 63;
>   		
>
> Modified: compiler-rt/trunk/lib/profile/InstrProfilingPlatformOther.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/profile/InstrProfilingPlatformOther.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/profile/InstrProfilingPlatformOther.c (original)
> +++ compiler-rt/trunk/lib/profile/InstrProfilingPlatformOther.c Wed May 14 21:22:34 2014
> @@ -1,4 +1,4 @@
> -/*===- InstrProfilingPlatformOther.c - Profile data default platfrom ------===*\
> +/*===- InstrProfilingPlatformOther.c - Profile data default platform ------===*\
>   |*
>   |*                     The LLVM Compiler Infrastructure
>   |*
>
> Modified: compiler-rt/trunk/lib/sanitizer_common/sanitizer_addrhashmap.h
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_addrhashmap.h?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/sanitizer_common/sanitizer_addrhashmap.h (original)
> +++ compiler-rt/trunk/lib/sanitizer_common/sanitizer_addrhashmap.h Wed May 14 21:22:34 2014
> @@ -22,7 +22,7 @@
>   namespace __sanitizer {
>   
>   // Concurrent uptr->T hashmap.
> -// T must be a POD type, kSize is preferrably a prime but can be any number.
> +// T must be a POD type, kSize is preferably a prime but can be any number.
>   // Usage example:
>   //
>   // typedef AddrHashMap<uptr, 11> Map;
>
> Modified: compiler-rt/trunk/lib/sanitizer_common/sanitizer_tls_get_addr.h
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_tls_get_addr.h?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/sanitizer_common/sanitizer_tls_get_addr.h (original)
> +++ compiler-rt/trunk/lib/sanitizer_common/sanitizer_tls_get_addr.h Wed May 14 21:22:34 2014
> @@ -43,7 +43,7 @@ struct DTLS {
>     uptr dtv_size;
>     DTV *dtv;  // dtv_size elements, allocated by MmapOrDie.
>   
> -  // Auxilary fields, don't access them outside sanitizer_tls_get_addr.cc
> +  // Auxiliary fields, don't access them outside sanitizer_tls_get_addr.cc
>     uptr last_memalign_size;
>     uptr last_memalign_ptr;
>   };
>
> Modified: compiler-rt/trunk/lib/sanitizer_common/scripts/cpplint.py
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/scripts/cpplint.py?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/sanitizer_common/scripts/cpplint.py (original)
> +++ compiler-rt/trunk/lib/sanitizer_common/scripts/cpplint.py Wed May 14 21:22:34 2014
> @@ -3634,7 +3634,7 @@ def UpdateIncludeState(filename, include
>       io: The io factory to use to read the file. Provided for testability.
>   
>     Returns:
> -    True if a header was succesfully added. False otherwise.
> +    True if a header was successfully added. False otherwise.
>     """
>     headerfile = None
>     try:
> @@ -3706,7 +3706,7 @@ def CheckForIncludeWhatYouUse(filename,
>     # Let's copy the include_state so it is only messed up within this function.
>     include_state = include_state.copy()
>   
> -  # Did we find the header for this file (if any) and succesfully load it?
> +  # Did we find the header for this file (if any) and successfully load it?
>     header_found = False
>   
>     # Use the absolute path so that matching works properly.
>
> Modified: compiler-rt/trunk/lib/tsan/rtl/tsan_flags.h
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/tsan/rtl/tsan_flags.h?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/tsan/rtl/tsan_flags.h (original)
> +++ compiler-rt/trunk/lib/tsan/rtl/tsan_flags.h Wed May 14 21:22:34 2014
> @@ -22,10 +22,10 @@ namespace __tsan {
>   struct Flags : CommonFlags, DDFlags {
>     // Enable dynamic annotations, otherwise they are no-ops.
>     bool enable_annotations;
> -  // Supress a race report if we've already output another race report
> +  // Suppress a race report if we've already output another race report
>     // with the same stack.
>     bool suppress_equal_stacks;
> -  // Supress a race report if we've already output another race report
> +  // Suppress a race report if we've already output another race report
>     // on the same address.
>     bool suppress_equal_addresses;
>     // Suppress weird race reports that can be seen if JVM is embed
>
> Modified: compiler-rt/trunk/lib/tsan/rtl/tsan_interface_atomic.cc
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/tsan/rtl/tsan_interface_atomic.cc?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/tsan/rtl/tsan_interface_atomic.cc (original)
> +++ compiler-rt/trunk/lib/tsan/rtl/tsan_interface_atomic.cc Wed May 14 21:22:34 2014
> @@ -12,7 +12,7 @@
>   //===----------------------------------------------------------------------===//
>   
>   // ThreadSanitizer atomic operations are based on C++11/C1x standards.
> -// For background see C++11 standard.  A slightly older, publically
> +// For background see C++11 standard.  A slightly older, publicly
>   // available draft of the standard (not entirely up-to-date, but close enough
>   // for casual browsing) is available here:
>   // http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2011/n3242.pdf
>
> Modified: compiler-rt/trunk/lib/tsan/tests/rtl/tsan_test_util.h
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/tsan/tests/rtl/tsan_test_util.h?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/lib/tsan/tests/rtl/tsan_test_util.h (original)
> +++ compiler-rt/trunk/lib/tsan/tests/rtl/tsan_test_util.h Wed May 14 21:22:34 2014
> @@ -37,7 +37,7 @@ class Mutex {
>     ~Mutex();
>   
>     void Init();
> -  void StaticInit();  // Emulates static initalization (tsan invisible).
> +  void StaticInit();  // Emulates static initialization (tsan invisible).
>     void Destroy();
>     void Lock();
>     bool TryLock();
>
> Modified: compiler-rt/trunk/make/platform/clang_darwin.mk
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/make/platform/clang_darwin.mk?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/make/platform/clang_darwin.mk (original)
> +++ compiler-rt/trunk/make/platform/clang_darwin.mk Wed May 14 21:22:34 2014
> @@ -1,4 +1,4 @@
> -# These are the functions which clang needs when it is targetting a previous
> +# These are the functions which clang needs when it is targeting a previous
>   # version of the OS. The issue is that the backend may use functions which were
>   # not present in the libgcc that shipped on the platform. In such cases, we link
>   # with a version of the library which contains private_extern definitions of all
> @@ -62,18 +62,18 @@ UniversalArchs :=
>   Configs += eprintf
>   UniversalArchs.eprintf := $(call CheckArches,i386,eprintf)
>   
> -# Configuration for targetting 10.4. We need a few functions missing from
> +# Configuration for targeting 10.4. We need a few functions missing from
>   # libgcc_s.10.4.dylib. We only build x86 slices since clang doesn't really
> -# support targetting PowerPC.
> +# support targeting PowerPC.
>   Configs += 10.4
>   UniversalArchs.10.4 := $(call CheckArches,i386 x86_64,10.4)
>   
> -# Configuration for targetting iOS for a couple of functions that didn't
> +# Configuration for targeting iOS for a couple of functions that didn't
>   # make it into libSystem.
>   Configs += ios
>   UniversalArchs.ios := $(call CheckArches,i386 x86_64 x86_64h armv7,ios)
>   
> -# Configuration for targetting OSX. These functions may not be in libSystem
> +# Configuration for targeting OSX. These functions may not be in libSystem
>   # so we should provide our own.
>   Configs += osx
>   UniversalArchs.osx := $(call CheckArches,i386 x86_64 x86_64h,osx)
>
> Modified: compiler-rt/trunk/make/platform/clang_macho_embedded.mk
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/make/platform/clang_macho_embedded.mk?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/make/platform/clang_macho_embedded.mk (original)
> +++ compiler-rt/trunk/make/platform/clang_macho_embedded.mk Wed May 14 21:22:34 2014
> @@ -1,4 +1,4 @@
> -# These are the functions which clang needs when it is targetting a previous
> +# These are the functions which clang needs when it is targeting a previous
>   # version of the OS. The issue is that the backend may use functions which were
>   # not present in the libgcc that shipped on the platform. In such cases, we link
>   # with a version of the library which contains private_extern definitions of all
>
> Modified: compiler-rt/trunk/make/platform/darwin_fat.mk
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/make/platform/darwin_fat.mk?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/make/platform/darwin_fat.mk (original)
> +++ compiler-rt/trunk/make/platform/darwin_fat.mk Wed May 14 21:22:34 2014
> @@ -8,7 +8,7 @@
>   #             software floating point).
>   #
>   # This section must define one of:
> -#   UniveralArchs - A list of architectures to build for, when using universal build
> +#   UniversalArchs - A list of architectures to build for, when using universal build
>   #           support (e.g., on Darwin). This should only be used to build fat
>   #           libraries, simply building multiple libraries for different
>   #           architectures should do so using distinct configs, with the
>
> Modified: compiler-rt/trunk/test/asan/TestCases/Darwin/interface_symbols_darwin.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Darwin/interface_symbols_darwin.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/test/asan/TestCases/Darwin/interface_symbols_darwin.c (original)
> +++ compiler-rt/trunk/test/asan/TestCases/Darwin/interface_symbols_darwin.c Wed May 14 21:22:34 2014
> @@ -1,4 +1,4 @@
> -// Check the presense of interface symbols in the ASan runtime dylib.
> +// Check the presence of interface symbols in the ASan runtime dylib.
>   // If you're changing this file, please also change
>   // ../Linux/interface_symbols.c
>   
>
> Modified: compiler-rt/trunk/test/asan/TestCases/Linux/interface_symbols_linux.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Linux/interface_symbols_linux.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/test/asan/TestCases/Linux/interface_symbols_linux.c (original)
> +++ compiler-rt/trunk/test/asan/TestCases/Linux/interface_symbols_linux.c Wed May 14 21:22:34 2014
> @@ -1,4 +1,4 @@
> -// Check the presense of interface symbols in compiled file.
> +// Check the presence of interface symbols in compiled file.
>   
>   // RUN: %clang_asan -O2 %s -o %t.exe
>   // RUN: nm -D %t.exe | grep " T " | sed "s/.* T //" \
>
> Modified: compiler-rt/trunk/test/asan/TestCases/Linux/malloc-in-qsort.cc
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Linux/malloc-in-qsort.cc?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/test/asan/TestCases/Linux/malloc-in-qsort.cc (original)
> +++ compiler-rt/trunk/test/asan/TestCases/Linux/malloc-in-qsort.cc Wed May 14 21:22:34 2014
> @@ -6,7 +6,7 @@
>   // (i.e. if we can unwind through a function compiled w/o frame pointers).
>   // https://code.google.com/p/address-sanitizer/issues/detail?id=137
>   
> -// Fast unwinder is only avaliable on x86_64 and i386.
> +// Fast unwinder is only available on x86_64 and i386.
>   // REQUIRES: x86_64-supported-target
>   
>   // REQUIRES: compiler-rt-optimized
>
> Modified: compiler-rt/trunk/test/asan/TestCases/Linux/overflow-in-qsort.cc
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Linux/overflow-in-qsort.cc?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/test/asan/TestCases/Linux/overflow-in-qsort.cc (original)
> +++ compiler-rt/trunk/test/asan/TestCases/Linux/overflow-in-qsort.cc Wed May 14 21:22:34 2014
> @@ -6,7 +6,7 @@
>   // (i.e. if we can unwind through a function compiled w/o frame pointers).
>   // https://code.google.com/p/address-sanitizer/issues/detail?id=137
>   
> -// Fast unwinder is only avaliable on x86_64 and i386.
> +// Fast unwinder is only available on x86_64 and i386.
>   // REQUIRES: x86_64-supported-target
>   
>   #include <stdlib.h>
>
> Modified: compiler-rt/trunk/test/profile/instrprof-write-file-only.c
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/profile/instrprof-write-file-only.c?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/test/profile/instrprof-write-file-only.c (original)
> +++ compiler-rt/trunk/test/profile/instrprof-write-file-only.c Wed May 14 21:22:34 2014
> @@ -21,7 +21,7 @@ int main(int argc, const char *argv[]) {
>   }
>   int foo(int X) {
>     // There should be no profiling information for @foo, since it was called
> -  // after the profile was written (and the atexit was supressed by defining
> +  // after the profile was written (and the atexit was suppressed by defining
>     // profile_runtime).
>     // CHECK-LABEL: define i32 @foo
>     // CHECK: br i1 %{{.*}}, label %{{.*}}, label %{{[^,]+$}}
>
> Modified: compiler-rt/trunk/test/tsan/allocator_returns_null.cc
> URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/tsan/allocator_returns_null.cc?rev=208841&r1=208840&r2=208841&view=diff
> ==============================================================================
> --- compiler-rt/trunk/test/tsan/allocator_returns_null.cc (original)
> +++ compiler-rt/trunk/test/tsan/allocator_returns_null.cc Wed May 14 21:22:34 2014
> @@ -1,5 +1,5 @@
>   // Test the behavior of malloc/calloc/realloc when the allocation size is huge.
> -// By default (allocator_may_return_null=0) the process shoudl crash.
> +// By default (allocator_may_return_null=0) the process should crash.
>   // With allocator_may_return_null=1 the allocator should return 0.
>   //
>   // RUN: %clangxx_tsan -O0 %s -o %t
>
>
> _______________________________________________
> llvm-commits mailing list
> llvm-commits at cs.uiuc.edu
> http://lists.cs.uiuc.edu/mailman/listinfo/llvm-commits

-- 
http://www.nuanti.com
the browser experts




More information about the llvm-commits mailing list