poke-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH 2/2] Fix some typos in HACKING


From: Dan Čermák
Subject: [PATCH 2/2] Fix some typos in HACKING
Date: Wed, 11 Dec 2019 23:46:05 +0100

From: Dan Čermák <address@hidden>

---
 HACKING | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/HACKING b/HACKING
index 403908c..9a4f30f 100644
--- a/HACKING
+++ b/HACKING
@@ -462,7 +462,7 @@ coverage
 
 refresh-po
   This target download the latest available translations from the
-  translationproject and installs them in the source tree.
+  translation project and installs them in the source tree.
 
 update-copyright
   Run this rule once per year (usually early in January) to update all
@@ -497,7 +497,7 @@ The Poke Compiler
 Compiler Overview
 ~~~~~~~~~~~~~~~~~
 
-This figure depicts the architecutre of the compiler::
+This figure depicts the architecture of the compiler::
   
       /--------\
       | source |
@@ -537,7 +537,7 @@ limitations in the LARL parser:
 - It annotates variables with their lexical addresses.
 - It links return statements with their containing functions.
 - It annotates return statements with he number of lexical frames they
-  should pop before exitting the function.
+  should pop before exiting the function.
 
 As we shall see below, any further analysis and transformations on the
 AST are performed by the compiler phases, which are implemented
@@ -749,7 +749,7 @@ A *struct type*
      element.  C1 is a poke expression evaluating to a boolean; it is
      the constraint associated to the element.   Of all these
      attributes, only T1 is mandatory.  PINNED is a boolean indicating
-     whether structs having this type are pinnned.
+     whether structs having this type are pinned.
 
 A *function type*
   Type expressions for functions are characterized by a type
@@ -930,8 +930,8 @@ In practice you will seldom find yourself in the need to use
 ``pkl_ast_node_free``.
 
 However, there are situations where ``ASTDEREF`` is necessary in order
-toavoid a memory leak.  For example, consider transformations like ``a
--> b`` to ``a -> x -> b``.  In that case, you sould use something
+to avoid a memory leak.  For example, consider transformations like ``a
+-> b`` to ``a -> x -> b``.  In that case, you should use something
 like::
 
   b = PKL_AST_KIND_WHAT (node);
@@ -976,7 +976,7 @@ an entry point into the routine (as a Jittery VM ``program 
point``)::
 However, since ``routine`` is malloc-allocated, the GC can't traverse
 it.  Consequently, the references to contained boxed values won't be
 accounted for, and these values will be collected if there are no more
-refences to them!
+references to them!
 
 The solution, recommended by Luca Saiu, is to keep an array of
 pointers in the closure structure, containing the pointers to every
@@ -1201,7 +1201,7 @@ the PKL compiler, manage their own memory.
 Valgrind gets easily confused by the GCs tampering with the stack, and
 emits a lot of spurious warnings.  Fortunately it is possible to tell
 memcheck to omit these warnings: the file etc/boehm-gc.suppresions
-contains a list of suppresions.
+contains a list of suppressions.
 
 Invoke valgrind with ``--suppressions=etc/boehm-gc.suppressions``.
 
@@ -1212,10 +1212,10 @@ please use::
 
 
 Then process raw.log with the ``etc/parse-valgrind-suppressions.sh``
-script, wilcard the result as much as you can, and append the results
+script, wildcard the result as much as you can, and append the results
 to ``etc/boehm-gc.suppressions``.
 
-In order to run the testsuite with valgring, edit lib/poke-dg.exp and
+In order to run the testsuite with valgrind, edit ``lib/poke-dg.exp`` and
 uncomment the lines::
 
  set VALGRIND "valgrind --quiet \
-- 
2.24.0




reply via email to

[Prev in Thread] Current Thread [Next in Thread]