https://git.reactos.org/?p=reactos.git;a=commitdiff;h=ffb20d3330269b21ca1b61ceef54b924f6de8557
commit ffb20d3330269b21ca1b61ceef54b924f6de8557 Author: Ratin Gao <ra...@knsoft.org> AuthorDate: Sun Dec 24 04:37:08 2023 +0800 Commit: GitHub <nore...@github.com> CommitDate: Sat Dec 23 21:37:08 2023 +0100 [REACTOS] Fix typos (#6198) - Adress -> Address - Currupted -> Corrupted 3rd-party files are not modified. --- dll/win32/mapi32/stubs.c | 2 +- drivers/network/tcpip/ip/network/ip.c | 2 +- hal/halx86/acpi/halpnpdd.c | 2 +- hal/halx86/apic/apic.c | 2 +- hal/halx86/apic/apicp.h | 4 ++-- hal/halx86/legacy/halpnpdd.c | 2 +- hal/halx86/mp/mpconfig.c | 2 +- modules/rosapps/applications/devutils/syscalldump/syscalldump.c | 6 +++--- ntoskrnl/ex/sysinfo.c | 4 ++-- ntoskrnl/ke/i386/traphdlr.c | 2 +- ntoskrnl/mm/ARM3/miarm.h | 2 +- ntoskrnl/mm/ARM3/section.c | 2 +- ntoskrnl/mm/i386/page.c | 2 +- ntoskrnl/mm/marea.c | 2 +- ntoskrnl/mm/section.c | 2 +- sdk/include/c++/stlport/stl/_iostream_string.h | 2 +- sdk/include/ndk/mmtypes.h | 2 +- sdk/include/psdk/ntddndis.h | 2 +- sdk/lib/delayimp/delayimp.c | 2 +- sdk/lib/rtl/amd64/unwind.c | 2 +- sdk/tools/rsym/rsym64.c | 2 +- win32ss/gdi/eng/ldevobj.c | 6 +++--- 22 files changed, 28 insertions(+), 28 deletions(-) diff --git a/dll/win32/mapi32/stubs.c b/dll/win32/mapi32/stubs.c index 87e4f2ffb3a..25ae1cc08cc 100644 --- a/dll/win32/mapi32/stubs.c +++ b/dll/win32/mapi32/stubs.c @@ -39,7 +39,7 @@ OpenTnefStreamEx( ULONG ulFlags, LPMESSAGE lpMessage, WORD wKeyVal, - LPADDRESSBOOK lpAdressBook, + LPADDRESSBOOK lpAddressBook, LPSTREAM *lppTNEF) { UNIMPLEMENTED; diff --git a/drivers/network/tcpip/ip/network/ip.c b/drivers/network/tcpip/ip/network/ip.c index 1328be9b47c..6bc1dd1395e 100644 --- a/drivers/network/tcpip/ip/network/ip.c +++ b/drivers/network/tcpip/ip/network/ip.c @@ -161,7 +161,7 @@ VOID IPDispatchProtocol( AddrInitIPv4(&SrcAddress, ((PIPv4_HEADER)(IPPacket->Header))->SrcAddr); break; case IP_ADDRESS_V6: - /* FIXME: IPv6 adresses not supported */ + /* FIXME: IPv6 addresses not supported */ TI_DbgPrint(MIN_TRACE, ("IPv6 datagram discarded.\n")); return; default: diff --git a/hal/halx86/acpi/halpnpdd.c b/hal/halx86/acpi/halpnpdd.c index 0dabbcc6f5b..890b0580e4f 100644 --- a/hal/halx86/acpi/halpnpdd.c +++ b/hal/halx86/acpi/halpnpdd.c @@ -324,7 +324,7 @@ HalpQueryCapabilities(IN PDEVICE_OBJECT DeviceObject, Capabilities->UniqueID = TRUE; Capabilities->SilentInstall = TRUE; - /* Fill out the adress */ + /* Fill out the address */ Capabilities->Address = InterfaceTypeUndefined; Capabilities->UINumber = InterfaceTypeUndefined; diff --git a/hal/halx86/apic/apic.c b/hal/halx86/apic/apic.c index 0fe921149f6..0c563c335d5 100644 --- a/hal/halx86/apic/apic.c +++ b/hal/halx86/apic/apic.c @@ -290,7 +290,7 @@ VOID NTAPI ApicInitializeLocalApic(ULONG Cpu) { - APIC_BASE_ADRESS_REGISTER BaseRegister; + APIC_BASE_ADDRESS_REGISTER BaseRegister; APIC_SPURIOUS_INERRUPT_REGISTER SpIntRegister; LVT_REGISTER LvtEntry; diff --git a/hal/halx86/apic/apicp.h b/hal/halx86/apic/apicp.h index 0a91da45992..e723a4f0696 100644 --- a/hal/halx86/apic/apicp.h +++ b/hal/halx86/apic/apicp.h @@ -183,7 +183,7 @@ typedef enum _TIMER_DV } TIMER_DV; #include <pshpack1.h> -typedef union _APIC_BASE_ADRESS_REGISTER +typedef union _APIC_BASE_ADDRESS_REGISTER { UINT64 LongLong; struct @@ -195,7 +195,7 @@ typedef union _APIC_BASE_ADRESS_REGISTER UINT64 BaseAddress:40; UINT64 ReservedMBZ:12; }; -} APIC_BASE_ADRESS_REGISTER; +} APIC_BASE_ADDRESS_REGISTER; typedef union _APIC_SPURIOUS_INERRUPT_REGISTER { diff --git a/hal/halx86/legacy/halpnpdd.c b/hal/halx86/legacy/halpnpdd.c index 90e7d1294ae..9e8633f011a 100644 --- a/hal/halx86/legacy/halpnpdd.c +++ b/hal/halx86/legacy/halpnpdd.c @@ -301,7 +301,7 @@ HalpQueryCapabilities(IN PDEVICE_OBJECT DeviceObject, Capabilities->UniqueID = TRUE; Capabilities->SilentInstall = TRUE; - /* Fill out the adress */ + /* Fill out the address */ Capabilities->Address = InterfaceTypeUndefined; Capabilities->UINumber = InterfaceTypeUndefined; diff --git a/hal/halx86/mp/mpconfig.c b/hal/halx86/mp/mpconfig.c index e229d936699..4288b0009a9 100644 --- a/hal/halx86/mp/mpconfig.c +++ b/hal/halx86/mp/mpconfig.c @@ -291,7 +291,7 @@ HaliReadMPConfigTable(PMP_CONFIGURATION_TABLE Table) if (Table->LocalAPICAddress != APIC_DEFAULT_BASE) { - DPRINT1("APIC base address is at 0x%X. I cannot handle non-standard adresses\n", + DPRINT1("APIC base address is at 0x%X. I cannot handle non-standard addresses\n", Table->LocalAPICAddress); ASSERT(FALSE); return FALSE; diff --git a/modules/rosapps/applications/devutils/syscalldump/syscalldump.c b/modules/rosapps/applications/devutils/syscalldump/syscalldump.c index 8b35ce75531..2d5b112f3fc 100644 --- a/modules/rosapps/applications/devutils/syscalldump/syscalldump.c +++ b/modules/rosapps/applications/devutils/syscalldump/syscalldump.c @@ -39,9 +39,9 @@ ImageSymToVa(HANDLE hProcess, PSYMBOL_INFO pSym, PBYTE pModule, PCSTR Name) } #if defined(__GNUC__) && \ (__GNUC__ * 10000 + __GNUC_MINOR__ * 100 + __GNUC_PATCHLEVEL__ < 40400) - printf("looking up adress for %s: 0x%llx\n", Name, pSym->Address); + printf("looking up address for %s: 0x%llx\n", Name, pSym->Address); #else - printf("looking up adress for %s: 0x%I64x\n", Name, pSym->Address); + printf("looking up address for %s: 0x%I64x\n", Name, pSym->Address); #endif NtHeaders = ImageNtHeader(pModule); @@ -160,7 +160,7 @@ cont: if (!pW32pServiceTable || !pW32pServiceLimit || !pW32pArgumentTable) { - printf("Couldn't find adress!\n"); + printf("Couldn't find address!\n"); goto cleanup; } diff --git a/ntoskrnl/ex/sysinfo.c b/ntoskrnl/ex/sysinfo.c index 58b023466a1..e7e67cd85b9 100644 --- a/ntoskrnl/ex/sysinfo.c +++ b/ntoskrnl/ex/sysinfo.c @@ -1386,7 +1386,7 @@ QSI_DEF(SystemHandleInformation) HandleInformation->Handles[Index].CreatorBackTraceIndex = 0; -#if 0 /* FIXME!!! Type field currupted */ +#if 0 /* FIXME!!! Type field corrupted */ HandleInformation->Handles[Index].ObjectTypeIndex = (UCHAR) ObjectHeader->Type->Index; #else @@ -2572,7 +2572,7 @@ QSI_DEF(SystemExtendedHandleInformation) HandleInformation->Handle[Index].CreatorBackTraceIndex = 0; -#if 0 /* FIXME!!! Type field currupted */ +#if 0 /* FIXME!!! Type field corrupted */ HandleInformation->Handles[Index].ObjectTypeIndex = (UCHAR) ObjectHeader->Type->Index; #else diff --git a/ntoskrnl/ke/i386/traphdlr.c b/ntoskrnl/ke/i386/traphdlr.c index e9045186f12..db25cfc0661 100644 --- a/ntoskrnl/ke/i386/traphdlr.c +++ b/ntoskrnl/ke/i386/traphdlr.c @@ -1159,7 +1159,7 @@ KiTrap0DHandler(IN PKTRAP_FRAME TrapFrame) * which will cause a GPF since the trap frame is a total mess (on purpose) * as built in KiEnterV86Mode. * - * The idea is to scan for IRET, scan for the known EIP adress, validate CS + * The idea is to scan for IRET, scan for the known EIP address, validate CS * and then manually issue a jump to the V8086 return EIP. */ Instructions = (PUCHAR)TrapFrame->Eip; diff --git a/ntoskrnl/mm/ARM3/miarm.h b/ntoskrnl/mm/ARM3/miarm.h index 1776b69a918..b11aef4626d 100644 --- a/ntoskrnl/mm/ARM3/miarm.h +++ b/ntoskrnl/mm/ARM3/miarm.h @@ -862,7 +862,7 @@ MI_MAKE_PROTOTYPE_PTE(IN PMMPTE NewPte, /* * Prototype PTEs are only valid in paged pool by design, this little trick - * lets us only use 30 bits for the adress of the PTE, as long as the area + * lets us only use 30 bits for the address of the PTE, as long as the area * stays 1024MB At most. */ Offset = (ULONG_PTR)PointerPte - (ULONG_PTR)MmPagedPoolStart; diff --git a/ntoskrnl/mm/ARM3/section.c b/ntoskrnl/mm/ARM3/section.c index fed3fa0f685..b7f5606f68d 100644 --- a/ntoskrnl/mm/ARM3/section.c +++ b/ntoskrnl/mm/ARM3/section.c @@ -1142,7 +1142,7 @@ MiMapViewInSystemSpace( SectionOffset->QuadPart); ASSERT(NT_SUCCESS(Status)); - /* Return the base adress of the mapping and success */ + /* Return the base address of the mapping and success */ *MappedBase = Base; return STATUS_SUCCESS; } diff --git a/ntoskrnl/mm/i386/page.c b/ntoskrnl/mm/i386/page.c index df13cb013e2..33299ca375b 100644 --- a/ntoskrnl/mm/i386/page.c +++ b/ntoskrnl/mm/i386/page.c @@ -904,7 +904,7 @@ MmSetDirtyBit(PEPROCESS Process, PVOID Address, BOOLEAN Bit) MiMakePdeExistAndMakeValid(MiAddressToPde(Address), Process, MM_NOIRQL); PointerPte = MiAddressToPte(Address); - // We shouldnl't set dirty bit on non-mapped adresses + // We shouldnl't set dirty bit on non-mapped addresses if (!PointerPte->u.Hard.Valid && (FlagOn(PointerPte->u.Long, 0x800) || (PointerPte->u.Hard.PageFrameNumber == 0))) { DPRINT1("Invalid Pte %lx\n", PointerPte->u.Long); diff --git a/ntoskrnl/mm/marea.c b/ntoskrnl/mm/marea.c index 281226c4afc..76c545e6ffd 100644 --- a/ntoskrnl/mm/marea.c +++ b/ntoskrnl/mm/marea.c @@ -346,7 +346,7 @@ MmFreeMemoryArea( ASSERT(MemoryArea->Type == MEMORY_AREA_SECTION_VIEW); #endif - /* MmCleanProcessAddressSpace might have removed it (and this would be MmDeleteProcessAdressSpace) */ + /* MmCleanProcessAddressSpace might have removed it (and this would be MmDeleteProcessAddressSpace) */ ASSERT(MemoryArea->VadNode.u.VadFlags.Spare != 0); if (((PMMVAD)MemoryArea->Vad)->u.VadFlags.Spare == 1) { diff --git a/ntoskrnl/mm/section.c b/ntoskrnl/mm/section.c index ff77ef77077..0e4c0e1bcc7 100644 --- a/ntoskrnl/mm/section.c +++ b/ntoskrnl/mm/section.c @@ -4551,7 +4551,7 @@ MmMapViewInSystemSpaceEx ( return Status; } -/* This function must be called with adress space lock held */ +/* This function must be called with address space lock held */ NTSTATUS NTAPI MiRosUnmapViewInSystemSpace(IN PVOID MappedBase) diff --git a/sdk/include/c++/stlport/stl/_iostream_string.h b/sdk/include/c++/stlport/stl/_iostream_string.h index 87656a4ce59..2a5923e38de 100644 --- a/sdk/include/c++/stlport/stl/_iostream_string.h +++ b/sdk/include/c++/stlport/stl/_iostream_string.h @@ -98,7 +98,7 @@ struct __basic_iostring : public basic_string<_CharT, char_traits<_CharT>, __ios /* * A consequence of the non standard conformant allocator is that a string using it * must always be presized to the allocator static buffer size because the basic_string implementation - * do not manage an allocator returning always the same memory adress as long as the + * do not manage an allocator returning always the same memory address as long as the * requested memory block size is under a certain value. */ typedef __basic_iostring<_CharT> _Self; diff --git a/sdk/include/ndk/mmtypes.h b/sdk/include/ndk/mmtypes.h index 56e918d5c2f..cccf5610f49 100644 --- a/sdk/include/ndk/mmtypes.h +++ b/sdk/include/ndk/mmtypes.h @@ -672,7 +672,7 @@ typedef struct _MM_AVL_TABLE } MM_AVL_TABLE, *PMM_AVL_TABLE; // -// Virtual Adress List used in VADs +// Virtual Address List used in VADs // typedef struct _MMADDRESS_LIST { diff --git a/sdk/include/psdk/ntddndis.h b/sdk/include/psdk/ntddndis.h index efdf04d422d..0c4707bfaed 100644 --- a/sdk/include/psdk/ntddndis.h +++ b/sdk/include/psdk/ntddndis.h @@ -435,7 +435,7 @@ typedef ULONG NDIS_OID, *PNDIS_OID; #define NDIS_MAC_OPTION_EOTX_INDICATION 0x00000020 #define NDIS_MAC_OPTION_8021P_PRIORITY 0x00000040 -#define NDIS_MAC_OPTION_SUPPORTS_MAC_ADRESS_OVERWRITE 0x00000080 +#define NDIS_MAC_OPTION_SUPPORTS_MAC_ADDRESS_OVERWRITE 0x00000080 #define NDIS_MAC_OPTION_RECEIVE_AT_DPC 0x00000100 #define NDIS_MAC_OPTION_8021Q_VLAN 0x00000200 #define NDIS_MAC_OPTION_RESERVED 0x80000000 diff --git a/sdk/lib/delayimp/delayimp.c b/sdk/lib/delayimp/delayimp.c index 0f86b67f2bd..91cdc2fd708 100644 --- a/sdk/lib/delayimp/delayimp.c +++ b/sdk/lib/delayimp/delayimp.c @@ -77,7 +77,7 @@ __delayLoadHelper2(PCImgDelayDescr pidd, PImgThunkData pIATEntry) dli.dlp.fImportByName = !IMAGE_SNAP_BY_ORDINAL(pINT[index].u1.Ordinal); if (dli.dlp.fImportByName) { - /* u1.AdressOfData points to a IMAGE_IMPORT_BY_NAME struct */ + /* u1.AddressOfData points to a IMAGE_IMPORT_BY_NAME struct */ PIMAGE_IMPORT_BY_NAME piibn = PFromRva((RVA)pINT[index].u1.AddressOfData); dli.dlp.szProcName = (LPCSTR)&piibn->Name; } diff --git a/sdk/lib/rtl/amd64/unwind.c b/sdk/lib/rtl/amd64/unwind.c index dec55f7d3a5..2883b4f494b 100644 --- a/sdk/lib/rtl/amd64/unwind.c +++ b/sdk/lib/rtl/amd64/unwind.c @@ -347,7 +347,7 @@ RtlpTryToUnwindEpilog( LocalContext.Rsp = GetReg(&LocalContext, Reg); - /* Get adressing mode */ + /* Get addressing mode */ Mod = (Instr >> 22) & 0x3; if (Mod == 0) { diff --git a/sdk/tools/rsym/rsym64.c b/sdk/tools/rsym/rsym64.c index 07e5596fa08..129e268fc5b 100644 --- a/sdk/tools/rsym/rsym64.c +++ b/sdk/tools/rsym/rsym64.c @@ -269,7 +269,7 @@ DwExecIntruction(PDW2CFSTATE State, char *pc) } /* These work differently. We are in a new function. - * We have to parse a lea opcode to find the adress of + * We have to parse a lea opcode to find the address of * the jump target. This is the reference to find the * appropriate C_SCOPE_TABLE. */ case 6: /* Filter func */ diff --git a/win32ss/gdi/eng/ldevobj.c b/win32ss/gdi/eng/ldevobj.c index b4f13b88d19..478800a9571 100644 --- a/win32ss/gdi/eng/ldevobj.c +++ b/win32ss/gdi/eng/ldevobj.c @@ -226,7 +226,7 @@ LDEVOBJ_pvFindImageProcAddress( { PVOID pvImageBase; PIMAGE_EXPORT_DIRECTORY pExportDir; - PVOID pvProcAdress = NULL; + PVOID pvProcAddress = NULL; PUSHORT pOrdinals; PULONG pNames, pAddresses; ULONG i; @@ -255,13 +255,13 @@ LDEVOBJ_pvFindImageProcAddress( if (_stricmp(pszProcName, RVA_TO_ADDR(pvImageBase, pNames[i])) == 0) { /* Found! Calculate the procedure address */ - pvProcAdress = RVA_TO_ADDR(pvImageBase, pAddresses[pOrdinals[i]]); + pvProcAddress = RVA_TO_ADDR(pvImageBase, pAddresses[pOrdinals[i]]); break; } } /* Return the address */ - return pvProcAdress; + return pvProcAddress; } static