From: jsg Date: Fri, 12 Mar 2021 14:15:49 +0000 (+0000) Subject: spelling X-Git-Url: http://artulab.com/gitweb/?a=commitdiff_plain;h=4af3577ff281f32bc2b40d899fa25046271de1d3;p=openbsd spelling ok mpi@ --- diff --git a/sys/uvm/uvm_extern.h b/sys/uvm/uvm_extern.h index fa7fa419d98..482d733b49e 100644 --- a/sys/uvm/uvm_extern.h +++ b/sys/uvm/uvm_extern.h @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_extern.h,v 1.156 2020/12/28 14:01:23 mpi Exp $ */ +/* $OpenBSD: uvm_extern.h,v 1.157 2021/03/12 14:15:49 jsg Exp $ */ /* $NetBSD: uvm_extern.h,v 1.57 2001/03/09 01:02:12 chs Exp $ */ /* @@ -219,7 +219,7 @@ struct vmspace { * uvm_constraint_range's: * MD code is allowed to setup constraint ranges for memory allocators, the * primary use for this is to keep allocation for certain memory consumers - * such as mbuf pools withing address ranges that are reachable by devices + * such as mbuf pools within address ranges that are reachable by devices * that perform DMA. * * It is also to discourge memory allocations from being satisfied from ranges diff --git a/sys/uvm/uvm_fault.c b/sys/uvm/uvm_fault.c index ff0e0e9f82e..bf1bfcd32a6 100644 --- a/sys/uvm/uvm_fault.c +++ b/sys/uvm/uvm_fault.c @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_fault.c,v 1.117 2021/03/01 09:09:35 mpi Exp $ */ +/* $OpenBSD: uvm_fault.c,v 1.118 2021/03/12 14:15:49 jsg Exp $ */ /* $NetBSD: uvm_fault.c,v 1.51 2000/08/06 00:22:53 thorpej Exp $ */ /* @@ -928,7 +928,7 @@ uvm_fault_upper(struct uvm_faultinfo *ufi, struct uvm_faultctx *flt, case VM_PAGER_ERROR: /* - * An error occured while trying to bring in the + * An error occurred while trying to bring in the * page -- this is the only error we return right * now. */ diff --git a/sys/uvm/uvm_glue.c b/sys/uvm/uvm_glue.c index e880997abc5..ee1bca5eac4 100644 --- a/sys/uvm/uvm_glue.c +++ b/sys/uvm/uvm_glue.c @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_glue.c,v 1.78 2021/02/08 10:51:02 mpi Exp $ */ +/* $OpenBSD: uvm_glue.c,v 1.79 2021/03/12 14:15:49 jsg Exp $ */ /* $NetBSD: uvm_glue.c,v 1.44 2001/02/06 19:54:44 eeh Exp $ */ /* @@ -333,7 +333,7 @@ int swapdebug = 0; * swapout_threads: find threads that can be swapped * * - called by the pagedaemon - * - try and swap at least one processs + * - try and swap at least one process * - processes that are sleeping or stopped for maxslp or more seconds * are swapped... otherwise the longest-sleeping or stopped process * is swapped, otherwise the longest resident process... diff --git a/sys/uvm/uvm_km.c b/sys/uvm/uvm_km.c index ba39b274d10..aea66f7ec26 100644 --- a/sys/uvm/uvm_km.c +++ b/sys/uvm/uvm_km.c @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_km.c,v 1.140 2021/03/04 09:00:03 mpi Exp $ */ +/* $OpenBSD: uvm_km.c,v 1.141 2021/03/12 14:15:49 jsg Exp $ */ /* $NetBSD: uvm_km.c,v 1.42 2001/01/14 02:10:01 thorpej Exp $ */ /* @@ -145,7 +145,7 @@ struct vm_map *kernel_map = NULL; struct uvm_constraint_range no_constraint = { 0x0, (paddr_t)-1 }; /* - * local data structues + * local data structures */ static struct vm_map kernel_map_store; diff --git a/sys/uvm/uvm_map.c b/sys/uvm/uvm_map.c index 434bfddbfdb..d62981f3c74 100644 --- a/sys/uvm/uvm_map.c +++ b/sys/uvm/uvm_map.c @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_map.c,v 1.272 2021/03/05 05:30:44 jsg Exp $ */ +/* $OpenBSD: uvm_map.c,v 1.273 2021/03/12 14:15:49 jsg Exp $ */ /* $NetBSD: uvm_map.c,v 1.86 2000/11/27 08:40:03 chs Exp $ */ /* @@ -667,7 +667,7 @@ uvm_map_sel_limits(vaddr_t *min, vaddr_t *max, vsize_t sz, int guardpg, /* * Fixup: it's possible that pmap_min and pmap_max - * cross eachother. In this case, try to find one + * cross each other. In this case, try to find one * address that is allowed. * (This usually happens in biased case.) */ @@ -1473,14 +1473,14 @@ uvm_mapent_isjoinable(struct vm_map *map, struct vm_map_entry *e1, if (e2->aref.ar_amap && amap_refs(e2->aref.ar_amap) != 1) return 0; - /* Apprently, e1 and e2 match. */ + /* Apparently, e1 and e2 match. */ return 1; } /* * Join support function. * - * Returns the merged entry on succes. + * Returns the merged entry on success. * Returns NULL if the merge failed. */ struct vm_map_entry* diff --git a/sys/uvm/uvm_map.h b/sys/uvm/uvm_map.h index 7d187295274..531d6f2ef06 100644 --- a/sys/uvm/uvm_map.h +++ b/sys/uvm/uvm_map.h @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_map.h,v 1.68 2020/10/09 08:16:28 mpi Exp $ */ +/* $OpenBSD: uvm_map.h,v 1.69 2021/03/12 14:15:49 jsg Exp $ */ /* $NetBSD: uvm_map.h,v 1.24 2001/02/18 21:19:08 chs Exp $ */ /* @@ -101,7 +101,7 @@ /* * UVM_MAP_CLIP_END: ensure that the entry ends at or before - * the ending address, if it does't we split the entry. + * the ending address, if it doesn't we split the entry. * * => map must be locked by caller */ diff --git a/sys/uvm/uvm_pager.c b/sys/uvm/uvm_pager.c index f808c6e536a..c5195224087 100644 --- a/sys/uvm/uvm_pager.c +++ b/sys/uvm/uvm_pager.c @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_pager.c,v 1.74 2021/01/19 13:21:36 mpi Exp $ */ +/* $OpenBSD: uvm_pager.c,v 1.75 2021/03/12 14:15:49 jsg Exp $ */ /* $NetBSD: uvm_pager.c,v 1.36 2000/11/27 18:26:41 chs Exp $ */ /* @@ -526,7 +526,7 @@ ReTry: } /* - * a pager error occured (even after dropping the cluster, if there + * a pager error occurred (even after dropping the cluster, if there * was one). give up! the caller only has one page ("pg") * to worry about. */ diff --git a/sys/uvm/uvm_pager.h b/sys/uvm/uvm_pager.h index 7067078ba9a..ceafdbede3b 100644 --- a/sys/uvm/uvm_pager.h +++ b/sys/uvm/uvm_pager.h @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_pager.h,v 1.31 2021/03/04 08:38:48 mpi Exp $ */ +/* $OpenBSD: uvm_pager.h,v 1.32 2021/03/12 14:15:49 jsg Exp $ */ /* $NetBSD: uvm_pager.h,v 1.20 2000/11/27 08:40:05 chs Exp $ */ /* @@ -146,7 +146,7 @@ struct vm_page **uvm_mk_pcluster(struct uvm_object *, struct vm_page **, * AGAIN temporary resource shortage prevented operation from happening * UNLOCK unlock the map and try again * REFAULT [uvm_fault internal use only!] unable to relock data structures, - * thus the mapping needs to be reverified before we can procede + * thus the mapping needs to be reverified before we can proceed */ #define VM_PAGER_OK 0 #define VM_PAGER_BAD 1 diff --git a/sys/uvm/uvm_pmemrange.c b/sys/uvm/uvm_pmemrange.c index 49c31fc7d67..3e33efdf6d5 100644 --- a/sys/uvm/uvm_pmemrange.c +++ b/sys/uvm/uvm_pmemrange.c @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_pmemrange.c,v 1.60 2020/12/01 13:56:22 mpi Exp $ */ +/* $OpenBSD: uvm_pmemrange.c,v 1.61 2021/03/12 14:15:49 jsg Exp $ */ /* * Copyright (c) 2009, 2010 Ariane van der Steldt @@ -989,7 +989,7 @@ retry_desperate: result, start, end, 0); /* - * If we found sufficient pages, go to the succes exit code. + * If we found sufficient pages, go to the success exit code. * * Otherwise, go immediately to fail, since we collected * all we could anyway. @@ -1093,7 +1093,7 @@ drain_found: /* * If there's still space left in found, try to - * fully drain it prior to continueing. + * fully drain it prior to continuing. */ if (found != NULL) { fstart = fend; @@ -1143,7 +1143,7 @@ drain_found: * iteration may fall out. Hence there is a small chance of a false * negative. * - * When desparate: scan all sizes starting at the smallest + * When desperate: scan all sizes starting at the smallest * (start_try = 1) and do not consider UVM_PLA_TRYCONTIG (which may * allow us to hit the fast path now). * @@ -1186,7 +1186,7 @@ fail: return ENOMEM; out: - /* Allocation succesful. */ + /* Allocation successful. */ uvmexp.free -= fcount; uvm_unlock_fpageq(); diff --git a/sys/uvm/uvm_swap_encrypt.c b/sys/uvm/uvm_swap_encrypt.c index aadcbb64068..deb2ff5b637 100644 --- a/sys/uvm/uvm_swap_encrypt.c +++ b/sys/uvm/uvm_swap_encrypt.c @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_swap_encrypt.c,v 1.23 2021/01/09 21:00:29 gnezdo Exp $ */ +/* $OpenBSD: uvm_swap_encrypt.c,v 1.24 2021/03/12 14:15:49 jsg Exp $ */ /* * Copyright 1999 Niels Provos @@ -136,7 +136,7 @@ swap_encrypt(struct swap_key *key, caddr_t src, caddr_t dst, u_int64_t block, ddst[2] = dsrc[2] ^ iv3; ddst[3] = dsrc[3] ^ iv4; /* - * Do not worry about endianess, it only needs to decrypt + * Do not worry about endianness, it only needs to decrypt * on this machine. */ rijndael_encrypt(&swap_ctxt, (u_char *)ddst, (u_char *)ddst); diff --git a/sys/uvm/uvm_vnode.c b/sys/uvm/uvm_vnode.c index c26b938e7c1..55d98192462 100644 --- a/sys/uvm/uvm_vnode.c +++ b/sys/uvm/uvm_vnode.c @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_vnode.c,v 1.111 2021/03/04 08:38:48 mpi Exp $ */ +/* $OpenBSD: uvm_vnode.c,v 1.112 2021/03/12 14:15:49 jsg Exp $ */ /* $NetBSD: uvm_vnode.c,v 1.36 2000/11/24 20:34:01 chs Exp $ */ /* @@ -960,7 +960,7 @@ uvn_get(struct uvm_object *uobj, voff_t offset, struct vm_page **pps, /* * XXX: given the "advice", should we consider async read-ahead? - * XXX: fault current does deactive of pages behind us. is + * XXX: fault current does deactivate of pages behind us. is * this good (other callers might now). */ /*