Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp11112431rwb; Fri, 25 Nov 2022 11:11:43 -0800 (PST) X-Google-Smtp-Source: AA0mqf7b72ALiWak96KlSgFCpim8uTwoV3XqbdIqyhsYOG9Ekt9sVJRGXDaaY/Hc3xqKK+oTekGh X-Received: by 2002:a63:4908:0:b0:477:e0b4:3f5 with SMTP id w8-20020a634908000000b00477e0b403f5mr4378786pga.265.1669403502872; Fri, 25 Nov 2022 11:11:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669403502; cv=none; d=google.com; s=arc-20160816; b=vTfEnnXoLjL5gPOYfwcQPY6HNVUBHfq2h8FyVcFSIcaClxYF78WFyWZfyTPfblGga4 uHxuwOA/R4NTxSNBxLYzr1lZldepPYSwG0Emzc9lRulrVxIjvhHDQm+g3PUd5+8+YX8E BbHWI4t6FHvWi54474mAbnMhLAH0e9zueykL0LoZrbESDbKOcE+XBRTjMITiBilc+taP nDYyJWaCYF+iHSqCY7f0Rr6QrxmrXvqlk7wTmDExPDFNBZAz5bYe6ZlvsrY3/FdjByh7 EbjH8v5Lo6rA+Kq7SFFoRrMYMsL0xUcWgNHL9fdaSYInTdjQuhAv6pibAOIBVx7ecBBN REpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=R113yfqtwbqC0ITDeGvhSNa3zHrb/nkgAVqOtFCA4Qc=; b=g2ZnJmDIuwqI2+JUpZ7Ak/MJEebWu0PK9Y7+diSNQ2z8YiL0OCfZcZKWspDezCedWF +2nMm+wpuIQFI6pk7AVkpqfwKvBoSpXCW7Z7vT022Sr9zemHKYtrKQsXeXEC8yUt1fef pA8YFf6acMRUUhXux03sGuJL6ctIYwwtB79fzHILiKM/ZKzyC/Hv/TZPvLtHmZJYr47w rnJx5qXajhJ4HhpWRAZTPvJOYMcUl1OEMClG7WmLrdbx8rLfLkelGdfWXmnSovJ17y5t VrnCtPajXzrlb4hTxivLb1l7ppyb9wSn13mGM4HgpvoOYVVeUFp8YLywiIQlpyqhnfI7 PXfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=sS359yY7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l28-20020a63ba5c000000b00476f69c03f8si4524284pgu.845.2022.11.25.11.11.32; Fri, 25 Nov 2022 11:11:42 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=sS359yY7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229601AbiKYSio (ORCPT + 85 others); Fri, 25 Nov 2022 13:38:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51220 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229611AbiKYSim (ORCPT ); Fri, 25 Nov 2022 13:38:42 -0500 Received: from mail-yb1-xb2a.google.com (mail-yb1-xb2a.google.com [IPv6:2607:f8b0:4864:20::b2a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0AEF612628 for ; Fri, 25 Nov 2022 10:38:42 -0800 (PST) Received: by mail-yb1-xb2a.google.com with SMTP id c140so6008570ybf.11 for ; Fri, 25 Nov 2022 10:38:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=R113yfqtwbqC0ITDeGvhSNa3zHrb/nkgAVqOtFCA4Qc=; b=sS359yY7pQIaB3NIMVHYcqDqWmEn/ZMyYfc7T6oA3VOjJmqn0ykiDIAFmwHIQSbsLQ SwBMwRnZhBCbXGg6szCpfHmDgxIEcskbbt0mPR6iR10Lm8nOmVRFbaaGEpADctbzhWX7 fPe0fWjas4DFr8/jjVLoxV6jKNqu62BAu3ItCwKWCUpG4SZvIJExxAKMtYoF3/lTTibB wtCyMudC0RoYxPe2jfPlNOdYXLMVwnasC9E0dZJpO6P7XJIkWmnvWU/WvCispvu5W9wV J3BwUkORUs03UIenFoYtgGx+XVyBQFc0F2NrmWWLOlFOUKkSTmiql4z9rE5LNMxJQJmf by+Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=R113yfqtwbqC0ITDeGvhSNa3zHrb/nkgAVqOtFCA4Qc=; b=5NfKZhO5W8xtGb3Isut/R08Zfc0O/2R8p4WXEoQr7TDCqO5BiDPT3sdutJWEDHRnc1 BC6JtkzNdgJYnEwBC5zZH2wA9IxM1r8QEqRfu5QhriOjjbjDkDOXAqRwkXsgITVpwj2O q74p5HWexQ3+BUMFgtg8XD3lK+0SqTcYNXkH0oSFgV2JfxKmENU6VvSl4C9sravkQ/78 bUQn0G9JYyq/UA2c+UcC62TVstj3CvTgscI95ej/r9X/w+Eun7nksvMl03nfNHt+Qfyw h+/VkhkW1+mqvbpF6g+b1DOH9qEhzxjXI0ZPWiqie2k6uM6mIiU92OtIgICa1tQC5ZtU F/kw== X-Gm-Message-State: ANoB5pmmoAJYkKDiUcw5CRH/hs3ExSIhJSqkNP2Ey8uId1UBavp4/pmi ycIS+BAjGKoYxY+EaQplODM3uOdftuEleH2Ugfizgw== X-Received: by 2002:a25:7408:0:b0:6f2:49a7:38ef with SMTP id p8-20020a257408000000b006f249a738efmr6331877ybc.365.1669401521064; Fri, 25 Nov 2022 10:38:41 -0800 (PST) MIME-Version: 1.0 References: <20221123193519.3948105-1-tjmercier@google.com> <260a86f0-057e-e235-ac38-abeb922d0dc1@amd.com> <63972059-1c23-ceb9-841c-1cfee29a1c77@gmail.com> In-Reply-To: <63972059-1c23-ceb9-841c-1cfee29a1c77@gmail.com> From: "T.J. Mercier" Date: Fri, 25 Nov 2022 10:38:30 -0800 Message-ID: Subject: Re: [Linaro-mm-sig] Re: [PATCH] dma-buf: A collection of typo and documentation fixes To: =?UTF-8?Q?Christian_K=C3=B6nig?= Cc: =?UTF-8?Q?Christian_K=C3=B6nig?= , Sumit Semwal , linaro-mm-sig@lists.linaro.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 24, 2022 at 1:43 AM Christian K=C3=B6nig wrote: > > Am 24.11.22 um 10:05 schrieb Daniel Vetter: > > On Thu, Nov 24, 2022 at 08:03:09AM +0100, Christian K=C3=B6nig wrote: > >> Am 23.11.22 um 20:35 schrieb T.J. Mercier: > >>> I've been collecting these typo fixes for a while and it feels like > >>> time to send them in. > >>> > >>> Signed-off-by: T.J. Mercier > >> Acked-by: Christian K=C3=B6nig > > Will you also push this? I think tj doesn't have commit rights yet, and= I > > somehow can't see the patch locally (I guess it's stuck in moderation). > > I was just about to complain that this doesn't apply cleanly to > drm-misc-next. > > Trivial problem, one of the typos was just removed by Dimitry a few > weeks ago. > > I've fixed that up locally and pushed the result, but nevertheless > please make sure that DMA-buf patches are based on the drm branches. > I'm sorry, this was on top of a random spot in Linus's 6.1-rc5. (84368d882b96 Merge tag 'soc-fixes-6.1-3') I'm not sure why I did that, but I suspect it was after a fresh git pull. I have too many repos. Thanks all for the reviews. > Thanks, > Christian. > > > -Daniel > > > >>> --- > >>> drivers/dma-buf/dma-buf.c | 14 +++++++------- > >>> include/linux/dma-buf.h | 6 +++--- > >>> 2 files changed, 10 insertions(+), 10 deletions(-) > >>> > >>> diff --git a/drivers/dma-buf/dma-buf.c b/drivers/dma-buf/dma-buf.c > >>> index dd0f83ee505b..614ccd208af4 100644 > >>> --- a/drivers/dma-buf/dma-buf.c > >>> +++ b/drivers/dma-buf/dma-buf.c > >>> @@ -1141,7 +1141,7 @@ EXPORT_SYMBOL_NS_GPL(dma_buf_unmap_attachment, = DMA_BUF); > >>> * > >>> * @dmabuf: [in] buffer which is moving > >>> * > >>> - * Informs all attachmenst that they need to destroy and recreated a= ll their > >>> + * Informs all attachments that they need to destroy and recreate al= l their > >>> * mappings. > >>> */ > >>> void dma_buf_move_notify(struct dma_buf *dmabuf) > >>> @@ -1159,11 +1159,11 @@ EXPORT_SYMBOL_NS_GPL(dma_buf_move_notify, DMA= _BUF); > >>> /** > >>> * DOC: cpu access > >>> * > >>> - * There are mutliple reasons for supporting CPU access to a dma buf= fer object: > >>> + * There are multiple reasons for supporting CPU access to a dma buf= fer object: > >>> * > >>> * - Fallback operations in the kernel, for example when a device = is connected > >>> * over USB and the kernel needs to shuffle the data around firs= t before > >>> - * sending it away. Cache coherency is handled by braketing any tr= ansactions > >>> + * sending it away. Cache coherency is handled by bracketing any t= ransactions > >>> * with calls to dma_buf_begin_cpu_access() and dma_buf_end_cpu_= access() > >>> * access. > >>> * > >>> @@ -1190,7 +1190,7 @@ EXPORT_SYMBOL_NS_GPL(dma_buf_move_notify, DMA_B= UF); > >>> * replace ION buffers mmap support was needed. > >>> * > >>> * There is no special interfaces, userspace simply calls mmap o= n the dma-buf > >>> - * fd. But like for CPU access there's a need to braket the actual= access, > >>> + * fd. But like for CPU access there's a need to bracket the actua= l access, > >>> * which is handled by the ioctl (DMA_BUF_IOCTL_SYNC). Note that > >>> * DMA_BUF_IOCTL_SYNC can fail with -EAGAIN or -EINTR, in which = case it must > >>> * be restarted. > >>> @@ -1264,10 +1264,10 @@ static int __dma_buf_begin_cpu_access(struct = dma_buf *dmabuf, > >>> * preparations. Coherency is only guaranteed in the specified ran= ge for the > >>> * specified access direction. > >>> * @dmabuf: [in] buffer to prepare cpu access for. > >>> - * @direction: [in] length of range for cpu access. > >>> + * @direction: [in] direction of access. > >>> * > >>> * After the cpu access is complete the caller should call > >>> - * dma_buf_end_cpu_access(). Only when cpu access is braketed by bot= h calls is > >>> + * dma_buf_end_cpu_access(). Only when cpu access is bracketed by bo= th calls is > >>> * it guaranteed to be coherent with other DMA access. > >>> * > >>> * This function will also wait for any DMA transactions tracked t= hrough > >>> @@ -1307,7 +1307,7 @@ EXPORT_SYMBOL_NS_GPL(dma_buf_begin_cpu_access, = DMA_BUF); > >>> * actions. Coherency is only guaranteed in the specified range fo= r the > >>> * specified access direction. > >>> * @dmabuf: [in] buffer to complete cpu access for. > >>> - * @direction: [in] length of range for cpu access. > >>> + * @direction: [in] direction of access. > >>> * > >>> * This terminates CPU access started with dma_buf_begin_cpu_acces= s(). > >>> * > >>> diff --git a/include/linux/dma-buf.h b/include/linux/dma-buf.h > >>> index 71731796c8c3..1d61a4f6db35 100644 > >>> --- a/include/linux/dma-buf.h > >>> +++ b/include/linux/dma-buf.h > >>> @@ -330,7 +330,7 @@ struct dma_buf { > >>> * @lock: > >>> * > >>> * Used internally to serialize list manipulation, attach/detach = and > >>> - * vmap/unmap. Note that in many cases this is superseeded by > >>> + * vmap/unmap. Note that in many cases this is superseded by > >>> * dma_resv_lock() on @resv. > >>> */ > >>> struct mutex lock; > >>> @@ -365,7 +365,7 @@ struct dma_buf { > >>> */ > >>> const char *name; > >>> - /** @name_lock: Spinlock to protect name acces for read access. *= / > >>> + /** @name_lock: Spinlock to protect name access for read access. = */ > >>> spinlock_t name_lock; > >>> /** > >>> @@ -402,7 +402,7 @@ struct dma_buf { > >>> * anything the userspace API considers write access. > >>> * > >>> * - Drivers may just always add a write fence, since that only > >>> - * causes unecessarily synchronization, but no correctness issu= es. > >>> + * causes unnecessary synchronization, but no correctness issue= s. > >>> * > >>> * - Some drivers only expose a synchronous userspace API with no > >>> * pipelining across drivers. These do not set any fences for t= heir >