diff options
author | Paul Pluzhnikov <ppluzhnikov@google.com> | 2023-05-30 23:02:29 +0000 |
---|---|---|
committer | Paul Pluzhnikov <ppluzhnikov@google.com> | 2023-05-30 23:02:29 +0000 |
commit | 65cc53fe7c6556b90159b8c3da1eb283792387db (patch) | |
tree | 879c71521e54f86942bf3ba2a39f9b4bc2dfb915 /sysdeps/pthread | |
parent | 4d0fe291aed3a476a3b59c4ecfae9d35ac0f15e8 (diff) | |
download | glibc-65cc53fe7c6556b90159b8c3da1eb283792387db.tar.gz glibc-65cc53fe7c6556b90159b8c3da1eb283792387db.tar.xz glibc-65cc53fe7c6556b90159b8c3da1eb283792387db.zip |
Fix misspellings in sysdeps/ -- BZ 25337
Diffstat (limited to 'sysdeps/pthread')
-rw-r--r-- | sysdeps/pthread/cnd_wait.c | 2 | ||||
-rw-r--r-- | sysdeps/pthread/posix-timer.h | 2 | ||||
-rw-r--r-- | sysdeps/pthread/threads.h | 2 | ||||
-rw-r--r-- | sysdeps/pthread/tst-cancel12.c | 2 | ||||
-rw-r--r-- | sysdeps/pthread/tst-clock1.c | 2 | ||||
-rw-r--r-- | sysdeps/pthread/tst-cond2.c | 2 | ||||
-rw-r--r-- | sysdeps/pthread/tst-key2.c | 2 | ||||
-rw-r--r-- | sysdeps/pthread/tst-mutex10.c | 2 | ||||
-rw-r--r-- | sysdeps/pthread/tst-mutex2.c | 2 | ||||
-rw-r--r-- | sysdeps/pthread/tst-rwlock-tryrdlock-stall.c | 8 | ||||
-rw-r--r-- | sysdeps/pthread/tst-rwlock-trywrlock-stall.c | 2 | ||||
-rw-r--r-- | sysdeps/pthread/tst-tsd2.c | 2 |
12 files changed, 15 insertions, 15 deletions
diff --git a/sysdeps/pthread/cnd_wait.c b/sysdeps/pthread/cnd_wait.c index 0863a9f9f4..5c0877d0a8 100644 --- a/sysdeps/pthread/cnd_wait.c +++ b/sysdeps/pthread/cnd_wait.c @@ -1,4 +1,4 @@ -/* C11 threads conditional wait implementaiton. +/* C11 threads conditional wait implementation. Copyright (C) 2018-2023 Free Software Foundation, Inc. This file is part of the GNU C Library. diff --git a/sysdeps/pthread/posix-timer.h b/sysdeps/pthread/posix-timer.h index 4ac534ce7a..d87242f008 100644 --- a/sysdeps/pthread/posix-timer.h +++ b/sysdeps/pthread/posix-timer.h @@ -74,7 +74,7 @@ extern struct timer_node __timer_array[TIMER_MAX]; /* Global lock to protect operation on the lists. */ extern pthread_mutex_t __timer_mutex; -/* Variable to protext initialization. */ +/* Variable to protect initialization. */ extern pthread_once_t __timer_init_once_control; /* Nonzero if initialization of timer implementation failed. */ diff --git a/sysdeps/pthread/threads.h b/sysdeps/pthread/threads.h index 860d597d96..d88d7a3ddd 100644 --- a/sysdeps/pthread/threads.h +++ b/sysdeps/pthread/threads.h @@ -76,7 +76,7 @@ typedef union /* Threads functions. */ /* Create a new thread executing the function __FUNC. Arguments for __FUNC - are passed through __ARG. If succesful, __THR is set to new thread + are passed through __ARG. If successful, __THR is set to new thread identifier. */ extern int thrd_create (thrd_t *__thr, thrd_start_t __func, void *__arg); diff --git a/sysdeps/pthread/tst-cancel12.c b/sysdeps/pthread/tst-cancel12.c index 23b9ab2f2b..004f994b25 100644 --- a/sysdeps/pthread/tst-cancel12.c +++ b/sysdeps/pthread/tst-cancel12.c @@ -75,7 +75,7 @@ do_test (void) } /* A value higher than 0 will check for uncontended pthread cancellation, - where the sem_wait operation will return immediatelly. */ + where the sem_wait operation will return immediately. */ if (sem_init (&sem, 0, 1) != 0) { puts ("error: sem_init failed"); diff --git a/sysdeps/pthread/tst-clock1.c b/sysdeps/pthread/tst-clock1.c index b11d465fce..83a4bb2471 100644 --- a/sysdeps/pthread/tst-clock1.c +++ b/sysdeps/pthread/tst-clock1.c @@ -35,7 +35,7 @@ do_test (void) if (sysconf (_SC_THREAD_CPUTIME) >= 0) # endif { - puts ("cpuclock advertized, but cannot get ID"); + puts ("cpuclock advertised, but cannot get ID"); exit (1); } } diff --git a/sysdeps/pthread/tst-cond2.c b/sysdeps/pthread/tst-cond2.c index 95662aa7eb..baf08c0dbc 100644 --- a/sysdeps/pthread/tst-cond2.c +++ b/sysdeps/pthread/tst-cond2.c @@ -124,7 +124,7 @@ do_test (void) return 1; } - puts ("get lock outselves"); + puts ("get lock ourselves"); err = pthread_mutex_lock (&mut); if (err != 0) diff --git a/sysdeps/pthread/tst-key2.c b/sysdeps/pthread/tst-key2.c index 9f16dbfbe1..c77f270ad3 100644 --- a/sysdeps/pthread/tst-key2.c +++ b/sysdeps/pthread/tst-key2.c @@ -55,7 +55,7 @@ tf (void *arg) { pthread_key_t *key = (pthread_key_t *) arg; - /* Use an arbirary but valid pointer to avoid GCC warnings. */ + /* Use an arbitrary but valid pointer to avoid GCC warnings. */ if (pthread_setspecific (*key, arg) != 0) { write_message ("setspecific failed\n"); diff --git a/sysdeps/pthread/tst-mutex10.c b/sysdeps/pthread/tst-mutex10.c index 5e8d90a9e3..6a71d92001 100644 --- a/sysdeps/pthread/tst-mutex10.c +++ b/sysdeps/pthread/tst-mutex10.c @@ -47,7 +47,7 @@ thr_func (void *arg) There was a race in FORCE_ELISION macro which leads to either pthread_mutex_destroy returning EBUSY as the owner was recorded by pthread_mutex_lock - in "normal mutex" code path - but was not - resetted in pthread_mutex_unlock - in "elision" code path. + reset in pthread_mutex_unlock - in "elision" code path. Or it leads to the assertion in nptl/pthread_mutex_lock.c: assert (mutex->__data.__owner == 0); Please ensure that the test is run with lock elision: diff --git a/sysdeps/pthread/tst-mutex2.c b/sysdeps/pthread/tst-mutex2.c index d171f1d4fa..9f12f5f597 100644 --- a/sysdeps/pthread/tst-mutex2.c +++ b/sysdeps/pthread/tst-mutex2.c @@ -43,7 +43,7 @@ tf (void *arg) e = pthread_mutex_trylock (&m); if (e == 0) { - puts ("child: 1st trylock suceeded"); + puts ("child: 1st trylock succeeded"); exit (1); } if (e != EBUSY) diff --git a/sysdeps/pthread/tst-rwlock-tryrdlock-stall.c b/sysdeps/pthread/tst-rwlock-tryrdlock-stall.c index 9a292d477e..1f4569fe8d 100644 --- a/sysdeps/pthread/tst-rwlock-tryrdlock-stall.c +++ b/sysdeps/pthread/tst-rwlock-tryrdlock-stall.c @@ -68,11 +68,11 @@ 391 r ^ PTHREAD_RWLOCK_WRPHASE)) 392 { - And then attemps to start the read phase. + And then attempts to start the read phase. Assume there happens to be a tryrdlock at this point, noting that PTHREAD_RWLOCK_WRLOCKED is clear, and PTHREAD_RWLOCK_WRPHASE - is 1. So the try lock attemps to start the read phase. + is 1. So the try lock attempts to start the read phase. In __pthread_rwlock_tryrdlock: @@ -136,7 +136,7 @@ readers might indeed be waiting, and they are. The atomic_store_relaxed throws away PTHREAD_RWLOCK_FUTEX_USED, - and the waiting reader is never worken becuase as noted + and the waiting reader is never worken because as noted above it is conditional on the futex being used. The solution is for the trylock thread to inspect @@ -257,7 +257,7 @@ If we did not install the write phase then the readers may already be waiting on the futex, the original writer wrote 1 to __wrphase_futex as part of starting the write phase, and we cannot also write 1 - without loosing the PTHREAD_RWLOCK_FUTEX_USED bit. + without losing the PTHREAD_RWLOCK_FUTEX_USED bit. --- diff --git a/sysdeps/pthread/tst-rwlock-trywrlock-stall.c b/sysdeps/pthread/tst-rwlock-trywrlock-stall.c index 2a15c2864a..0dd42fd715 100644 --- a/sysdeps/pthread/tst-rwlock-trywrlock-stall.c +++ b/sysdeps/pthread/tst-rwlock-trywrlock-stall.c @@ -21,7 +21,7 @@ Summary for the pthread_rwlock_trywrlock() stall: The stall is caused by pthread_rwlock_trywrlock setting - __wrphase_futex futex to 1 and loosing the + __wrphase_futex futex to 1 and losing the PTHREAD_RWLOCK_FUTEX_USED bit. The fix for bug 23844 ensures that waiters on __wrphase_futex are diff --git a/sysdeps/pthread/tst-tsd2.c b/sysdeps/pthread/tst-tsd2.c index aa1119c307..ccecde7d3b 100644 --- a/sysdeps/pthread/tst-tsd2.c +++ b/sysdeps/pthread/tst-tsd2.c @@ -39,7 +39,7 @@ tf (void *arg) pthread_key_t key = (pthread_key_t) (long int) arg; int err; - /* Use an arbirary but valid pointer to avoid GCC warnings. */ + /* Use an arbitrary but valid pointer to avoid GCC warnings. */ err = pthread_setspecific (key, &result); if (err != 0) result = 3; |