Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp676747ybl; Thu, 23 Jan 2020 05:54:11 -0800 (PST) X-Google-Smtp-Source: APXvYqzT8zR+thmokOHEjq/wfHt8oTDz6Ido+lGdOy3hpNytYla5SDNdIXLYJhTCar9GGiyCvYMP X-Received: by 2002:a05:6830:18c4:: with SMTP id v4mr7484715ote.265.1579787651730; Thu, 23 Jan 2020 05:54:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579787651; cv=none; d=google.com; s=arc-20160816; b=v5l3WBFMESNd0MdcV+Eh6+91HlRHDaBXawaSCsbkCPZD6hiDrmiPL3D4oaDsacdhY9 QI6keNHZBCtJRfeNYfEuSJ2T7N8U2Qn8aLLmvB9S5UHcP9o95gQbScwD9Otdav2rnp5s wgHXNpPxVB2E+r1D3xaGcz6EJatbstCLjn0esR3KwUJ8/pPi9g4hZJ7yXZEoa2DKDc4j sv3LYNYvDQC1tnohVnm70H+4FzvC/svGjGcWvy8NG0VkZEpgSExH2fF//dvvcZHuzpUN 2EldGtMfax+0/CNiMyWV10iXamXrCQ0IaMKF+tleFUEC/jYfqK9lw/nlTzsiZU7N5Hqf i0sA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=lejD+q5fBhS6alfeYAKHhBVOqI8dEqaFH/rIn6PSGrM=; b=iFclaN8jWr4ApHQXnascN5sdWfNNb4If1YvlCU/6h+nSHTc0+dyO9HMcE2k/J5GgBK nnHyYnNb0MF6+U4qBJTsC2sBwb2wrEQZvhjA3NIKat7WE4c1fWY5TTyDv/I2D84Ke9s8 30F+RnL78qS2qQxuUOayM2imbmK3dFgkNo5UGsDAGEcgwwpkC3j2xBCzyaganMkXWa+9 45Izf2UQFR9hPqKV3GI3V0YoSWaOT/GBUr/QHu3BrD95/pBs5wwEejcocBcOm5K12ycz MsYXXZr4aem70kOn35k7bKhMtYc3OiIss/cWOwwV8/o1gAjO8rSZKPrurKSPFEcI0aCN cQKA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h18si1084611otr.265.2020.01.23.05.53.59; Thu, 23 Jan 2020 05:54:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728765AbgAWNxD (ORCPT + 99 others); Thu, 23 Jan 2020 08:53:03 -0500 Received: from hostingweb31-40.netsons.net ([89.40.174.40]:47618 "EHLO hostingweb31-40.netsons.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726729AbgAWNxD (ORCPT ); Thu, 23 Jan 2020 08:53:03 -0500 Received: from [109.168.11.45] (port=47192 helo=pc-ceresoli.dev.aim) by hostingweb31.netsons.net with esmtpa (Exim 4.92) (envelope-from ) id 1iucuq-000CNg-UL; Thu, 23 Jan 2020 14:53:00 +0100 From: Luca Ceresoli To: linux-i2c@vger.kernel.org, linux-doc@vger.kernel.org Cc: Luca Ceresoli , Wolfram Sang , Jean Delvare , Peter Rosin , linux-kernel@vger.kernel.org Subject: [PATCH v2 06/28] docs: i2c: replace "I2C-transfer" -> "I2C transfer" consistently Date: Thu, 23 Jan 2020 14:50:41 +0100 Message-Id: <20200123135103.20540-7-luca@lucaceresoli.net> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200123135103.20540-1-luca@lucaceresoli.net> References: <20200123135103.20540-1-luca@lucaceresoli.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - hostingweb31.netsons.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - lucaceresoli.net X-Get-Message-Sender-Via: hostingweb31.netsons.net: authenticated_id: luca+lucaceresoli.net/only user confirmed/virtual account not confirmed X-Authenticated-Sender: hostingweb31.netsons.net: luca@lucaceresoli.net X-Source: X-Source-Args: X-Source-Dir: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org "I2C transfer" is a legitimate english sentence, no need for a hyphen between the two words, as as such it is used in most of the documentation. Remove the hyphen in the few places where it is present. Signed-off-by: Luca Ceresoli Acked-by: Peter Rosin Reviewed-by: Jean Delvare --- Documentation/i2c/i2c-topology.rst | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/Documentation/i2c/i2c-topology.rst b/Documentation/i2c/i2c-topology.rst index b413ef6a6773..2a18b53e3508 100644 --- a/Documentation/i2c/i2c-topology.rst +++ b/Documentation/i2c/i2c-topology.rst @@ -137,14 +137,14 @@ Mux-locked Example When there is an access to D1, this happens: - 1. Someone issues an I2C-transfer to D1. + 1. Someone issues an I2C transfer to D1. 2. M1 locks muxes on its parent (the root adapter in this case). 3. M1 calls ->select to ready the mux. - 4. M1 (presumably) does some I2C-transfers as part of its select. - These transfers are normal I2C-transfers that locks the parent + 4. M1 (presumably) does some I2C transfers as part of its select. + These transfers are normal I2C transfers that locks the parent adapter. - 5. M1 feeds the I2C-transfer from step 1 to its parent adapter as a - normal I2C-transfer that locks the parent adapter. + 5. M1 feeds the I2C transfer from step 1 to its parent adapter as a + normal I2C transfer that locks the parent adapter. 6. M1 calls ->deselect, if it has one. 7. Same rules as in step 4, but for ->deselect. 8. M1 unlocks muxes on its parent. @@ -169,7 +169,7 @@ PL1. If you build a topology with a parent-locked mux being the child of another mux, this might break a possible assumption from the child mux that the root adapter is unused between its select op and the actual transfer (e.g. if the child mux is auto-closing - and the parent mux issues I2C-transfers as part of its select). + and the parent mux issues I2C transfers as part of its select). This is especially the case if the parent mux is mux-locked, but it may also happen if the parent mux is parent-locked. @@ -197,15 +197,15 @@ Parent-locked Example When there is an access to D1, this happens: - 1. Someone issues an I2C-transfer to D1. + 1. Someone issues an I2C transfer to D1. 2. M1 locks muxes on its parent (the root adapter in this case). 3. M1 locks its parent adapter. 4. M1 calls ->select to ready the mux. - 5. If M1 does any I2C-transfers (on this root adapter) as part of - its select, those transfers must be unlocked I2C-transfers so + 5. If M1 does any I2C transfers (on this root adapter) as part of + its select, those transfers must be unlocked I2C transfers so that they do not deadlock the root adapter. - 6. M1 feeds the I2C-transfer from step 1 to the root adapter as an - unlocked I2C-transfer, so that it does not deadlock the parent + 6. M1 feeds the I2C transfer from step 1 to the root adapter as an + unlocked I2C transfer, so that it does not deadlock the parent adapter. 7. M1 calls ->deselect, if it has one. 8. Same rules as in step 5, but for ->deselect. @@ -293,7 +293,7 @@ device lockups and/or other problems. The topology is especially troublesome if M2 is an auto-closing mux. In that case, any interleaved accesses to D4 might close M2 -prematurely, as might any I2C-transfers part of M1->select. +prematurely, as might any I2C transfers part of M1->select. But if M2 is not making the above stated assumption, and if M2 is not auto-closing, the topology is fine. -- 2.25.0