diff options
author | Jakub Jelinek <jakub@redhat.com> | 2022-03-01 19:43:04 +0100 |
---|---|---|
committer | Jakub Jelinek <jakub@redhat.com> | 2022-03-01 19:43:04 +0100 |
commit | 4a1c20df82c9e14478d79fbe1ae9690a36285ac1 (patch) | |
tree | 20d5c1c58cb2832c196d3a89348c542f56c9dbf6 | |
parent | 469073c1e6816d245fb402303883fee3d0c6a1cc (diff) | |
download | gcc-4a1c20df82c9e14478d79fbe1ae9690a36285ac1.zip gcc-4a1c20df82c9e14478d79fbe1ae9690a36285ac1.tar.gz gcc-4a1c20df82c9e14478d79fbe1ae9690a36285ac1.tar.bz2 |
warn-access: Comment spelling fixes
I've noticed various spelling bugs in comments in this file.
There is one spot I haven't fixed:
"Otherwise, VAR is the auto variable
(including an unnamed temporary such as a compound literal) whose
lifetime's rended it dangling."
I'm afraid I don't know what it wanted to say, "lifetime rendered it"
or something else?
2022-03-01 Jakub Jelinek <jakub@redhat.com>
* gimple-ssa-warn-access.cc (warn_string_no_nul,
maybe_warn_nonstring_arg, fndecl_alloc_p, new_delete_mismatch_p,
matching_alloc_calls_p, maybe_warn_alloc_args_overflow,
pass_waccess::check_alloca, pass_waccess::check_strcat,
memmodel_to_uhwi, fntype_argno_type,
pass_waccess::maybe_check_access_sizes,
pass_waccess::check_call_access,
pass_waccess::maybe_check_dealloc_call, pass_waccess::check_stmt):
Comment spelling fixes.
-rw-r--r-- | gcc/gimple-ssa-warn-access.cc | 30 |
1 files changed, 15 insertions, 15 deletions
diff --git a/gcc/gimple-ssa-warn-access.cc b/gcc/gimple-ssa-warn-access.cc index 80d41ea..d015c73 100644 --- a/gcc/gimple-ssa-warn-access.cc +++ b/gcc/gimple-ssa-warn-access.cc @@ -146,7 +146,7 @@ warn_string_no_nul (location_t loc, GimpleOrTree expr, const char *fname, loc = expansion_point_location_if_in_system_header (loc); bool warned; - /* Format the bound range as a string to keep the nuber of messages + /* Format the bound range as a string to keep the number of messages from exploding. */ char bndstr[80]; *bndstr = 0; @@ -619,7 +619,7 @@ maybe_warn_nonstring_arg (tree fndecl, GimpleOrTree exp) /* In a call to strncat with a bound in a range whose lower but not upper bound is less than the array size, reset ASIZE to be the same as the bound and the other variable to trigger - the apprpriate warning below. */ + the appropriate warning below. */ if (fncode == BUILT_IN_STRNCAT && bndrng[0] != bndrng[1] && wi::ltu_p (wi::to_offset (bndrng[0]), asize) @@ -1538,7 +1538,7 @@ check_access (tree expr, tree dstwrite, } /* Return true if STMT is a call to an allocation function. Unless - ALL_ALLOC is set, consider only functions that return dynmamically + ALL_ALLOC is set, consider only functions that return dynamically allocated objects. Otherwise return true even for all forms of alloca (including VLA). */ @@ -1720,7 +1720,7 @@ new_delete_mismatch_p (const demangle_component &newc, } /* Return true if DELETE_DECL is an operator delete that's not suitable - to call with a pointer returned fron NEW_DECL. */ + to call with a pointer returned from NEW_DECL. */ static bool new_delete_mismatch_p (tree new_decl, tree delete_decl) @@ -1960,7 +1960,7 @@ matching_alloc_calls_p (tree alloc_decl, tree dealloc_decl) } /* Return true if DEALLOC_DECL is a function suitable to deallocate - objectes allocated by the ALLOC call. */ + objects allocated by the ALLOC call. */ static bool matching_alloc_calls_p (gimple *alloc, tree dealloc_decl) @@ -2215,7 +2215,7 @@ alloc_max_size (void) /* Diagnose a call EXP to function FN decorated with attribute alloc_size whose argument numbers given by IDX with values given by ARGS exceed - the maximum object size or cause an unsigned oveflow (wrapping) when + the maximum object size or cause an unsigned overflow (wrapping) when multiplied. FN is null when EXP is a call via a function pointer. When ARGS[0] is null the function does nothing. ARGS[1] may be null for functions like malloc, and non-null for those like calloc that @@ -2388,7 +2388,7 @@ pass_waccess::check_alloca (gcall *stmt) /* -Walloca-larger-than and -Wvla-larger-than settings of less than HWI_MAX override the more general -Walloc-size-larger-than so unless either of the former options is smaller than the last - one (wchich would imply that the call was already checked), check + one (which would imply that the call was already checked), check the alloca arguments for overflow. */ const tree alloc_args[] = { call_arg (stmt, 0), NULL_TREE }; const int idx[] = { 0, -1 }; @@ -2471,7 +2471,7 @@ pass_waccess::check_strcat (gcall *stmt) /* There is no way here to determine the length of the string in the destination to which the SRC string is being appended so - just diagnose cases when the souce string is longer than + just diagnose cases when the source string is longer than the destination object. */ access_data data (m_ptr_qry.rvals, stmt, access_read_write, NULL_TREE, true, NULL_TREE, true); @@ -2789,7 +2789,7 @@ memmodel_to_uhwi (tree ord, gimple *stmt, unsigned HOST_WIDE_INT *cstval) else { /* Use the range query to determine constant values in the absence - of constant proppagation (such as at -O0). */ + of constant propagation (such as at -O0). */ value_range rng; if (!get_range_query (cfun)->range_of_expr (rng, ord, stmt) || !rng.constant_p () @@ -3270,7 +3270,7 @@ pass_waccess::check_builtin (gcall *stmt) } /* Returns the type of the argument ARGNO to function with type FNTYPE - or null when the typoe cannot be determined or no such argument exists. */ + or null when the type cannot be determined or no such argument exists. */ static tree fntype_argno_type (tree fntype, unsigned argno) @@ -3347,7 +3347,7 @@ pass_waccess::maybe_check_access_sizes (rdwr_map *rwm, tree fndecl, tree fntype, tree ptrtype = fntype_argno_type (fntype, ptridx); if (!ptrtype) /* A function with a prototype was redeclared without one and - the protype has been lost. See pr102759. Avoid dealing + the prototype has been lost. See pr102759. Avoid dealing with this pathological case. */ return; @@ -3605,7 +3605,7 @@ pass_waccess::check_call_access (gcall *stmt) if (!fntypeattrs) return false; - /* Map of attribute accewss specifications for function arguments. */ + /* Map of attribute access specifications for function arguments. */ rdwr_map rdwr_idx; init_attr_rdwr_indices (&rdwr_idx, fntypeattrs); @@ -3621,7 +3621,7 @@ pass_waccess::check_call_access (gcall *stmt) if (POINTER_TYPE_P (TREE_TYPE (arg))) { access->ptr = arg; - // A nonnull ACCESS->SIZE contains VLA bounds. */ + /* A nonnull ACCESS->SIZE contains VLA bounds. */ } else { @@ -3654,7 +3654,7 @@ check_nonstring_args (gcall *stmt) /* Issue a warning if a deallocation function such as free, realloc, or C++ operator delete is called with an argument not returned by a matching allocation function such as malloc or the corresponding - form of C++ operatorn new. */ + form of C++ operator new. */ void pass_waccess::maybe_check_dealloc_call (gcall *call) @@ -4331,7 +4331,7 @@ pass_waccess::check_stmt (gimple *stmt) if (m_check_dangling_p && gimple_clobber_p (stmt, CLOBBER_EOL)) { - /* Ignore clobber statemts in blocks with exceptional edges. */ + /* Ignore clobber statements in blocks with exceptional edges. */ basic_block bb = gimple_bb (stmt); edge e = EDGE_PRED (bb, 0); if (e->flags & EDGE_EH) |