From patchwork Thu Nov 24 09:25:14 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yu Zhe X-Patchwork-Id: 25406 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:f944:0:0:0:0:0 with SMTP id q4csp3288653wrr; Thu, 24 Nov 2022 01:38:37 -0800 (PST) X-Google-Smtp-Source: AA0mqf5Qx4OYpj2HzT0/cjgjJGGKCIeC/+HBeuquHU4EkQdEIa0OQUJ/LkHg2EdmTWlqt3UpXqFX X-Received: by 2002:a63:f048:0:b0:477:5e23:f9d1 with SMTP id s8-20020a63f048000000b004775e23f9d1mr10657054pgj.268.1669282717643; Thu, 24 Nov 2022 01:38:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669282717; cv=none; d=google.com; s=arc-20160816; b=tx+7v192kYvkv4uKFddLEsttfEm1JvESONQGY5RQQr7HpyORRYg3QGRN4iRu1hISwf lKIBkCEG1DmY/X8BKFyAz78Tl1ox/dh5ZylGiKrwn6fO+1HHAJyT0aGn/+Lztfv5m1Gi /1rX2PoqXss+e2iOYTFR7zOSKLGrUloSzTc95Pq/Ig3kyBe2rT818f9Ucls/NOIb9yQE Qpnl/2oLvs8pNoKZsvr3/VtFvRm7B3VzufuhBca/I+f6zWxHFkEErT8RAR3ZS8083JVb NTWvD0i1hYGF67uy/01pD3GgGGhVxlZzo1noSZJ2ByAeNyojivklibeWKwjrjv9o1Wif 8Jpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=03jN8qFt1aaiEF4WOj+CD6kwwGGAtHWwTvRGMTIEO/8=; b=ri9sVsgFJTyWX8LtoRxEInFrBwYko2txi2JbU2AWUHcnp93WVFt0d3wT/+xkmA3ssW NBQFJu/ciWcerWAP1XHy+bZRLDs+AxHw4vuaCd21mIyAnbJhBM4lOgYwcqxH9c7tPafP aFYFJ/94gyt/JO6Abbl8DbM8BxGW4PZ2aUnPgZyue7qbgDfRq2ymlfwt+lI/ZqaUDonl eaiiVfnFNAq2c7YHtPxd89CRetHROZ3z0lIRblT4bh2KNIgTa3NqodU48IHMWX7lhuiH FDHa/oK9mpiCTWzdeDIZSNDVLIkF0F3SC6NDJrVa704kIvloX8F4e+/JkyhAJmw55fv+ QMNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h62-20020a638341000000b004767da772f9si843831pge.267.2022.11.24.01.38.24; Thu, 24 Nov 2022 01:38:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229535AbiKXJ0J (ORCPT + 99 others); Thu, 24 Nov 2022 04:26:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36732 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229783AbiKXJ0H (ORCPT ); Thu, 24 Nov 2022 04:26:07 -0500 Received: from mail.nfschina.com (unknown [124.16.136.209]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id D8B6211E70F; Thu, 24 Nov 2022 01:26:05 -0800 (PST) Received: from localhost (unknown [127.0.0.1]) by mail.nfschina.com (Postfix) with ESMTP id 71C241E80CC6; Thu, 24 Nov 2022 17:22:26 +0800 (CST) X-Virus-Scanned: amavisd-new at test.com Received: from mail.nfschina.com ([127.0.0.1]) by localhost (mail.nfschina.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FuPqkGR70XhR; Thu, 24 Nov 2022 17:22:23 +0800 (CST) Received: from localhost.localdomain (unknown [180.167.10.98]) (Authenticated sender: yuzhe@nfschina.com) by mail.nfschina.com (Postfix) with ESMTPA id 311E81E80CB3; Thu, 24 Nov 2022 17:22:23 +0800 (CST) From: Yu Zhe To: kashyap.desai@broadcom.com, sumit.saxena@broadcom.com, shivasharan.srikanteshwara@broadcom.com, jejb@linux.ibm.com, martin.petersen@oracle.com Cc: megaraidlinux.pdl@broadcom.com, linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org, liqiong@nfschina.com, Yu Zhe Subject: [PATCH] scsi: megaraid_sas: fix some spelling mistakes in comment Date: Thu, 24 Nov 2022 17:25:14 +0800 Message-Id: <20221124092514.32032-1-yuzhe@nfschina.com> X-Mailer: git-send-email 2.11.0 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1750369794599957956?= X-GMAIL-MSGID: =?utf-8?q?1750369794599957956?= Fix typos in comment. Signed-off-by: Yu Zhe Reviewed-by: Randy Dunlap --- drivers/scsi/megaraid/megaraid_sas_fusion.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/scsi/megaraid/megaraid_sas_fusion.c b/drivers/scsi/megaraid/megaraid_sas_fusion.c index 6650f8c8e9b0..c53c29a0a018 100644 --- a/drivers/scsi/megaraid/megaraid_sas_fusion.c +++ b/drivers/scsi/megaraid/megaraid_sas_fusion.c @@ -80,7 +80,7 @@ static void megasas_fusion_crash_dump(struct megasas_instance *instance); * @ocr_context: If called from OCR context this will * be set to 1, else 0 * - * This function initates a chip reset followed by a wait for controller to + * This function initiates a chip reset followed by a wait for controller to * transition to ready state. * During this, driver will block all access to PCI config space from userspace */ @@ -334,7 +334,7 @@ megasas_fire_cmd_fusion(struct megasas_instance *instance, * * This function is only for fusion controllers. * Update host can queue, if firmware downgrade max supported firmware commands. - * Firmware upgrade case will be skiped because underlying firmware has + * Firmware upgrade case will be skipped because underlying firmware has * more resource than exposed to the OS. * */ @@ -2588,7 +2588,7 @@ static void megasas_stream_detect(struct megasas_instance *instance, if ((io_info->ldStartBlock != current_sd->next_seq_lba) && ((!io_info->isRead) || (!is_read_ahead))) /* - * Once the API availible we need to change this. + * Once the API available we need to change this. * At this point we are not allowing any gap */ continue; @@ -4650,7 +4650,7 @@ megasas_issue_tm(struct megasas_instance *instance, u16 device_handle, } /* - * megasas_fusion_smid_lookup : Look for fusion command correpspodning to SCSI + * megasas_fusion_smid_lookup : Look for fusion command corresponding to SCSI * @instance: per adapter struct * * Return Non Zero index, if SMID found in outstanding commands