Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp8643091rwb; Thu, 24 Nov 2022 02:17:45 -0800 (PST) X-Google-Smtp-Source: AA0mqf5PfRzIRbni19Z+s7PXMwC6yksJxo5m0LQ7Bcq2dpm/hM+Mgj2xNkbJCGqzNkdKme914gXd X-Received: by 2002:a63:dc45:0:b0:44e:46f9:7eeb with SMTP id f5-20020a63dc45000000b0044e46f97eebmr11825256pgj.3.1669285065546; Thu, 24 Nov 2022 02:17:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669285065; cv=none; d=google.com; s=arc-20160816; b=xEUW0TcrnXmMEX2SCdW1cD0l+2lqG4RuSdKIlXee5W0EnVve94L+22Gt+a4VuM0Ai2 pwro1adu/VrlJIn1MzbGJYrDHgaaMNebhX691kkZsBUdYmZoYZbivPJjLnKbHkNaaC/J BH/QCSlS/9G9cmyoLEgMZdOfcZ3kvaV4bDz2mehadNJ1Iew0DjYdbBq+3si6UuHGSH9Y yH5G4T9fOv9wF/Ruu10azpDHKQsMlkWVQ3zabJe6sU8Tnq24uidLrbGVlVJIr2zvdwfE YkDMI6KcEBXLW8z4zX3o/HORsJTjEzCTiEx7x8q3RGMapcrmCHMFkuYh+cjEM6fk5Kay F2TQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=03jN8qFt1aaiEF4WOj+CD6kwwGGAtHWwTvRGMTIEO/8=; b=ri9sVsgFJTyWX8LtoRxEInFrBwYko2txi2JbU2AWUHcnp93WVFt0d3wT/+xkmA3ssW NBQFJu/ciWcerWAP1XHy+bZRLDs+AxHw4vuaCd21mIyAnbJhBM4lOgYwcqxH9c7tPafP aFYFJ/94gyt/JO6Abbl8DbM8BxGW4PZ2aUnPgZyue7qbgDfRq2ymlfwt+lI/ZqaUDonl eaiiVfnFNAq2c7YHtPxd89CRetHROZ3z0lIRblT4bh2KNIgTa3NqodU48IHMWX7lhuiH FDHa/oK9mpiCTWzdeDIZSNDVLIkF0F3SC6NDJrVa704kIvloX8F4e+/JkyhAJmw55fv+ QMNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a13-20020a62d40d000000b005725d4d6fcdsi644877pfh.205.2022.11.24.02.17.34; Thu, 24 Nov 2022 02:17:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229535AbiKXJ0J (ORCPT + 87 others); Thu, 24 Nov 2022 04:26:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36732 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229783AbiKXJ0H (ORCPT ); Thu, 24 Nov 2022 04:26:07 -0500 Received: from mail.nfschina.com (unknown [124.16.136.209]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id D8B6211E70F; Thu, 24 Nov 2022 01:26:05 -0800 (PST) Received: from localhost (unknown [127.0.0.1]) by mail.nfschina.com (Postfix) with ESMTP id 71C241E80CC6; Thu, 24 Nov 2022 17:22:26 +0800 (CST) X-Virus-Scanned: amavisd-new at test.com Received: from mail.nfschina.com ([127.0.0.1]) by localhost (mail.nfschina.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FuPqkGR70XhR; Thu, 24 Nov 2022 17:22:23 +0800 (CST) Received: from localhost.localdomain (unknown [180.167.10.98]) (Authenticated sender: yuzhe@nfschina.com) by mail.nfschina.com (Postfix) with ESMTPA id 311E81E80CB3; Thu, 24 Nov 2022 17:22:23 +0800 (CST) From: Yu Zhe To: kashyap.desai@broadcom.com, sumit.saxena@broadcom.com, shivasharan.srikanteshwara@broadcom.com, jejb@linux.ibm.com, martin.petersen@oracle.com Cc: megaraidlinux.pdl@broadcom.com, linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org, liqiong@nfschina.com, Yu Zhe Subject: [PATCH] scsi: megaraid_sas: fix some spelling mistakes in comment Date: Thu, 24 Nov 2022 17:25:14 +0800 Message-Id: <20221124092514.32032-1-yuzhe@nfschina.com> X-Mailer: git-send-email 2.11.0 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix typos in comment. Signed-off-by: Yu Zhe --- drivers/scsi/megaraid/megaraid_sas_fusion.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/scsi/megaraid/megaraid_sas_fusion.c b/drivers/scsi/megaraid/megaraid_sas_fusion.c index 6650f8c8e9b0..c53c29a0a018 100644 --- a/drivers/scsi/megaraid/megaraid_sas_fusion.c +++ b/drivers/scsi/megaraid/megaraid_sas_fusion.c @@ -80,7 +80,7 @@ static void megasas_fusion_crash_dump(struct megasas_instance *instance); * @ocr_context: If called from OCR context this will * be set to 1, else 0 * - * This function initates a chip reset followed by a wait for controller to + * This function initiates a chip reset followed by a wait for controller to * transition to ready state. * During this, driver will block all access to PCI config space from userspace */ @@ -334,7 +334,7 @@ megasas_fire_cmd_fusion(struct megasas_instance *instance, * * This function is only for fusion controllers. * Update host can queue, if firmware downgrade max supported firmware commands. - * Firmware upgrade case will be skiped because underlying firmware has + * Firmware upgrade case will be skipped because underlying firmware has * more resource than exposed to the OS. * */ @@ -2588,7 +2588,7 @@ static void megasas_stream_detect(struct megasas_instance *instance, if ((io_info->ldStartBlock != current_sd->next_seq_lba) && ((!io_info->isRead) || (!is_read_ahead))) /* - * Once the API availible we need to change this. + * Once the API available we need to change this. * At this point we are not allowing any gap */ continue; @@ -4650,7 +4650,7 @@ megasas_issue_tm(struct megasas_instance *instance, u16 device_handle, } /* - * megasas_fusion_smid_lookup : Look for fusion command correpspodning to SCSI + * megasas_fusion_smid_lookup : Look for fusion command corresponding to SCSI * @instance: per adapter struct * * Return Non Zero index, if SMID found in outstanding commands -- 2.11.0