From ceebaaa9d6eaa82c45b8420b2045571fc3c654b6 Mon Sep 17 00:00:00 2001 From: enkilee Date: Mon, 14 Jul 2025 09:38:06 +0800 Subject: [PATCH 1/2] fix typos --- arch/openrisc/mm/fault.c | 2 +- drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c | 4 ++-- drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c | 4 ++-- drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c | 4 ++-- drivers/gpu/drm/qxl/qxl_gem.c | 2 +- drivers/hid/hid-appleir.c | 2 +- drivers/hid/hid-logitech-hidpp.c | 2 +- drivers/infiniband/hw/qib/qib_sd7220.c | 2 +- drivers/net/ethernet/freescale/gianfar.h | 2 +- drivers/net/ethernet/mellanox/mlx4/cq.c | 4 ++-- drivers/net/phy/mxl-gpy.c | 2 +- .../net/wireless/realtek/rtlwifi/btcoexist/halbtc8192e2ant.c | 2 +- .../net/wireless/realtek/rtlwifi/btcoexist/halbtc8723b2ant.c | 2 +- .../net/wireless/realtek/rtlwifi/btcoexist/halbtc8821a2ant.c | 2 +- drivers/thermal/cpuidle_cooling.c | 2 +- fs/pnode.c | 4 ++-- include/linux/ti_wilink_st.h | 4 ++-- kernel/delayacct.c | 2 +- kernel/sched/cputime.c | 2 +- kernel/taskstats.c | 2 +- kernel/time/posix-timers.c | 2 +- tools/testing/selftests/net/psock_tpacket.c | 2 +- tools/testing/selftests/powerpc/vphn/test-vphn.c | 2 +- 23 files changed, 29 insertions(+), 29 deletions(-) diff --git a/arch/openrisc/mm/fault.c b/arch/openrisc/mm/fault.c index 29e232d78d82..46f1b8e2205c 100644 --- a/arch/openrisc/mm/fault.c +++ b/arch/openrisc/mm/fault.c @@ -222,7 +222,7 @@ asmlinkage void do_page_fault(struct pt_regs *regs, unsigned long address, /* Are we prepared to handle this kernel fault? * * (The kernel has valid exception-points in the source - * when it acesses user-memory. When it fails in one + * when it accesses user-memory. When it fails in one * of those points, we find it in a table and do a jump * to some fixup code that loads an appropriate error * code) diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c b/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c index 62ecf4d89cb9..7dafc14ecf76 100644 --- a/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c +++ b/drivers/gpu/drm/amd/amdgpu/gmc_v10_0.c @@ -247,7 +247,7 @@ static void gmc_v10_0_flush_vm_hub(struct amdgpu_device *adev, uint32_t vmid, spin_lock(&adev->gmc.invalidate_lock); /* - * It may lose gpuvm invalidate acknowldege state across power-gating + * It may lose gpuvm invalidate acknowledge state across power-gating * off cycle, add semaphore acquire before invalidation and semaphore * release after invalidation to avoid entering power gated state * to WA the Issue @@ -479,7 +479,7 @@ static uint64_t gmc_v10_0_emit_flush_gpu_tlb(struct amdgpu_ring *ring, unsigned int eng = ring->vm_inv_eng; /* - * It may lose gpuvm invalidate acknowldege state across power-gating + * It may lose gpuvm invalidate acknowledge state across power-gating * off cycle, add semaphore acquire before invalidation and semaphore * release after invalidation to avoid entering power gated state * to WA the Issue diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c b/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c index 3d797a1adef3..6133085e7465 100644 --- a/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c +++ b/drivers/gpu/drm/amd/amdgpu/gmc_v11_0.c @@ -208,7 +208,7 @@ static void gmc_v11_0_flush_vm_hub(struct amdgpu_device *adev, uint32_t vmid, spin_lock(&adev->gmc.invalidate_lock); /* - * It may lose gpuvm invalidate acknowldege state across power-gating + * It may lose gpuvm invalidate acknowledge state across power-gating * off cycle, add semaphore acquire before invalidation and semaphore * release after invalidation to avoid entering power gated state * to WA the Issue @@ -387,7 +387,7 @@ static uint64_t gmc_v11_0_emit_flush_gpu_tlb(struct amdgpu_ring *ring, unsigned int eng = ring->vm_inv_eng; /* - * It may lose gpuvm invalidate acknowldege state across power-gating + * It may lose gpuvm invalidate acknowledge state across power-gating * off cycle, add semaphore acquire before invalidation and semaphore * release after invalidation to avoid entering power gated state * to WA the Issue diff --git a/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c b/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c index 6d2b9d260d92..d96f7e7a25aa 100644 --- a/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c +++ b/drivers/gpu/drm/amd/amdgpu/gmc_v9_0.c @@ -859,7 +859,7 @@ static void gmc_v9_0_flush_gpu_tlb(struct amdgpu_device *adev, uint32_t vmid, spin_lock(&adev->gmc.invalidate_lock); /* - * It may lose gpuvm invalidate acknowldege state across power-gating + * It may lose gpuvm invalidate acknowledge state across power-gating * off cycle, add semaphore acquire before invalidation and semaphore * release after invalidation to avoid entering power gated state * to WA the Issue @@ -1040,7 +1040,7 @@ static uint64_t gmc_v9_0_emit_flush_gpu_tlb(struct amdgpu_ring *ring, unsigned int eng = ring->vm_inv_eng; /* - * It may lose gpuvm invalidate acknowldege state across power-gating + * It may lose gpuvm invalidate acknowledge state across power-gating * off cycle, add semaphore acquire before invalidation and semaphore * release after invalidation to avoid entering power gated state * to WA the Issue diff --git a/drivers/gpu/drm/qxl/qxl_gem.c b/drivers/gpu/drm/qxl/qxl_gem.c index fc5e3763c359..2cfe29d72d81 100644 --- a/drivers/gpu/drm/qxl/qxl_gem.c +++ b/drivers/gpu/drm/qxl/qxl_gem.c @@ -74,7 +74,7 @@ int qxl_gem_object_create(struct qxl_device *qdev, int size, /* * If the caller passed a valid gobj pointer, it is responsible to call - * drm_gem_object_put() when it no longer needs to acess the object. + * drm_gem_object_put() when it no longer needs to access the object. * * If gobj is NULL, it is handled internally. */ diff --git a/drivers/hid/hid-appleir.c b/drivers/hid/hid-appleir.c index c45e5aa569d2..6cd79502e485 100644 --- a/drivers/hid/hid-appleir.c +++ b/drivers/hid/hid-appleir.c @@ -117,7 +117,7 @@ struct appleir { static int get_key(int data) { /* - * The key is coded accross bits 2..9: + * The key is coded across bits 2..9: * * 0x00 or 0x01 ( ) key: 0 -> KEY_RESERVED * 0x02 or 0x03 ( menu ) key: 1 -> KEY_MENU diff --git a/drivers/hid/hid-logitech-hidpp.c b/drivers/hid/hid-logitech-hidpp.c index 4519ee377aa7..10a34019e60d 100644 --- a/drivers/hid/hid-logitech-hidpp.c +++ b/drivers/hid/hid-logitech-hidpp.c @@ -3349,7 +3349,7 @@ static int m560_input_mapping(struct hid_device *hdev, struct hid_input *hi, /* * The Logitech K400 keyboard has an embedded touchpad which is seen * as a mouse from the OS point of view. There is a hardware shortcut to disable - * tap-to-click but the setting is not remembered accross reset, annoying some + * tap-to-click but the setting is not remembered across reset, annoying some * users. * * We can toggle this feature from the host by using the feature 0x6010: diff --git a/drivers/infiniband/hw/qib/qib_sd7220.c b/drivers/infiniband/hw/qib/qib_sd7220.c index 1dc3ccf0cf1f..3a0c53eacacd 100644 --- a/drivers/infiniband/hw/qib/qib_sd7220.c +++ b/drivers/infiniband/hw/qib/qib_sd7220.c @@ -648,7 +648,7 @@ static int epb_trans(struct qib_devdata *dd, u16 reg, u64 i_val, u64 *o_vp) * @wd: Write Data - value to set in register * @mask: ones where data should be spliced into reg. * - * Basic register read/modify/write, with un-needed acesses elided. That is, + * Basic register read/modify/write, with un-needed accesses elided. That is, * a mask of zero will prevent write, while a mask of 0xFF will prevent read. * returns current (presumed, if a write was done) contents of selected * register, or <0 if errors. diff --git a/drivers/net/ethernet/freescale/gianfar.h b/drivers/net/ethernet/freescale/gianfar.h index 68b59d3202e3..233ea99dbfda 100644 --- a/drivers/net/ethernet/freescale/gianfar.h +++ b/drivers/net/ethernet/freescale/gianfar.h @@ -1304,7 +1304,7 @@ static inline void gfar_wmb(void) */ eieio(); #else - wmb(); /* order write acesses for BD (or FCB) fields */ + wmb(); /* order write accesses for BD (or FCB) fields */ #endif } diff --git a/drivers/net/ethernet/mellanox/mlx4/cq.c b/drivers/net/ethernet/mellanox/mlx4/cq.c index 4d4f9cf9facb..e130e7259275 100644 --- a/drivers/net/ethernet/mellanox/mlx4/cq.c +++ b/drivers/net/ethernet/mellanox/mlx4/cq.c @@ -115,7 +115,7 @@ void mlx4_cq_completion(struct mlx4_dev *dev, u32 cqn) return; } - /* Acessing the CQ outside of rcu_read_lock is safe, because + /* Accessing the CQ outside of rcu_read_lock is safe, because * the CQ is freed only after interrupt handling is completed. */ ++cq->arm_sn; @@ -137,7 +137,7 @@ void mlx4_cq_event(struct mlx4_dev *dev, u32 cqn, int event_type) return; } - /* Acessing the CQ outside of rcu_read_lock is safe, because + /* Accessing the CQ outside of rcu_read_lock is safe, because * the CQ is freed only after interrupt handling is completed. */ cq->event(cq, event_type); diff --git a/drivers/net/phy/mxl-gpy.c b/drivers/net/phy/mxl-gpy.c index 034f5c4d0337..1a53e677259f 100644 --- a/drivers/net/phy/mxl-gpy.c +++ b/drivers/net/phy/mxl-gpy.c @@ -102,7 +102,7 @@ #define REG_GPIO0_OUT 0xd3ce00 struct gpy_priv { - /* serialize mailbox acesses */ + /* serialize mailbox accesses */ struct mutex mbox_lock; u8 fw_major; diff --git a/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8192e2ant.c b/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8192e2ant.c index edcd3c879f7f..7bece8765c7f 100644 --- a/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8192e2ant.c +++ b/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8192e2ant.c @@ -1667,7 +1667,7 @@ static void btc8192e2ant_tdma_duration_adjust(struct btc_coexist *btcoexist, n = 3; wait_cnt = 0; } else { - /* accquire the BT TRx retry count from BT_Info byte2 */ + /* acquire the BT TRx retry count from BT_Info byte2 */ retry_cnt = coex_sta->bt_retry_cnt; rtl_dbg(rtlpriv, COMP_BT_COEXIST, DBG_LOUD, "[BTCoex], retry_cnt = %d\n", retry_cnt); diff --git a/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8723b2ant.c b/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8723b2ant.c index 7a71f063015a..df1ee39d6f49 100644 --- a/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8723b2ant.c +++ b/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8723b2ant.c @@ -1894,7 +1894,7 @@ static void btc8723b2ant_tdma_duration_adjust(struct btc_coexist *btcoexist, result = 0; wait_count = 0; } else { - /*accquire the BT TRx retry count from BT_Info byte2*/ + /*acquire the BT TRx retry count from BT_Info byte2*/ retry_count = coex_sta->bt_retry_cnt; if ((coex_sta->low_priority_tx) > 1050 || diff --git a/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8821a2ant.c b/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8821a2ant.c index c5b8df58d4a2..e9045551e89f 100644 --- a/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8821a2ant.c +++ b/drivers/net/wireless/realtek/rtlwifi/btcoexist/halbtc8821a2ant.c @@ -1780,7 +1780,7 @@ static void btc8821a2ant_tdma_duration_adjust(struct btc_coexist *btcoexist, result = 0; wait_count = 0; } else { - /* accquire the BT TRx retry count from BT_Info byte2 */ + /* acquire the BT TRx retry count from BT_Info byte2 */ retry_count = coex_sta->bt_retry_cnt; rtl_dbg(rtlpriv, COMP_BT_COEXIST, DBG_LOUD, "[BTCoex], retry_count = %d\n", retry_count); diff --git a/drivers/thermal/cpuidle_cooling.c b/drivers/thermal/cpuidle_cooling.c index 69f4c0a8dfcc..cc86456b99b4 100644 --- a/drivers/thermal/cpuidle_cooling.c +++ b/drivers/thermal/cpuidle_cooling.c @@ -66,7 +66,7 @@ static unsigned int cpuidle_cooling_runtime(unsigned int idle_duration_us, * @state : a pointer to the state variable to be filled * * The function always returns 100 as the injection ratio. It is - * percentile based for consistency accross different platforms. + * percentile based for consistency across different platforms. * * Return: The function can not fail, it is always zero */ diff --git a/fs/pnode.c b/fs/pnode.c index e4d0340393d5..26897fc3b844 100644 --- a/fs/pnode.c +++ b/fs/pnode.c @@ -603,7 +603,7 @@ int propagate_umount(struct list_head *list) /* * If the child has already been visited it is * know that it's entire peer group and all of - * their slaves in the propgation tree for the + * their slaves in the propagation tree for the * mountpoint has already been visited and there * is no need to visit this subtree again. */ @@ -611,7 +611,7 @@ int propagate_umount(struct list_head *list) continue; } else if (child->mnt.mnt_flags & MNT_UMOUNT) { /* - * We have come accross an partially unmounted + * We have come across an partially unmounted * mount in list that has not been visited yet. * Remember it has been visited and continue * about our merry way. diff --git a/include/linux/ti_wilink_st.h b/include/linux/ti_wilink_st.h index 10642d4844f0..ebfece83c662 100644 --- a/include/linux/ti_wilink_st.h +++ b/include/linux/ti_wilink_st.h @@ -108,11 +108,11 @@ extern long st_unregister(struct st_proto_s *); * @list: the list of protocols registered, only MAX can exist, one protocol * can register only once. * @rx_state: states to be maintained inside st's tty receive - * @rx_count: count to be maintained inside st's tty receieve + * @rx_count: count to be maintained inside st's tty receive * @rx_skb: the skb where all data for a protocol gets accumulated, * since tty might not call receive when a complete event packet * is received, the states, count and the skb needs to be maintained. - * @rx_chnl: the channel ID for which the data is getting accumalated for. + * @rx_chnl: the channel ID for which the data is getting accumulated for. * @txq: the list of skbs which needs to be sent onto the TTY. * @tx_waitq: if the chip is not in AWAKE state, the skbs needs to be queued * up in here, PM(WAKEUP_IND) data needs to be sent and then the skbs diff --git a/kernel/delayacct.c b/kernel/delayacct.c index f93d94be5394..05cb9dc2c734 100644 --- a/kernel/delayacct.c +++ b/kernel/delayacct.c @@ -94,7 +94,7 @@ void __delayacct_tsk_init(struct task_struct *tsk) /* * Finish delay accounting for a statistic using its timestamps (@start), - * accumalator (@total) and @count + * accumulator (@total) and @count */ static void delayacct_end(raw_spinlock_t *lock, u64 *start, u64 *total, u32 *count) { diff --git a/kernel/sched/cputime.c b/kernel/sched/cputime.c index a190b6fdadac..7b3686c765ad 100644 --- a/kernel/sched/cputime.c +++ b/kernel/sched/cputime.c @@ -619,7 +619,7 @@ void cputime_adjust(struct task_cputime *curr, struct prev_cputime *prev, stime = mul_u64_u64_div_u64(stime, rtime, stime + utime); /* * Because mul_u64_u64_div_u64() can approximate on some - * achitectures; enforce the constraint that: a*b/(b+c) <= a. + * architectures; enforce the constraint that: a*b/(b+c) <= a. */ if (unlikely(stime > rtime)) stime = rtime; diff --git a/kernel/taskstats.c b/kernel/taskstats.c index 2f19840248d7..b240e040581d 100644 --- a/kernel/taskstats.c +++ b/kernel/taskstats.c @@ -283,7 +283,7 @@ static void fill_tgid_exit(struct task_struct *tsk) /* * Each accounting subsystem calls its functions here to - * accumalate its per-task stats for tsk, into the per-tgid structure + * accumulate its per-task stats for tsk, into the per-tgid structure * * per-task-foo(tsk->signal->stats, tsk); */ diff --git a/kernel/time/posix-timers.c b/kernel/time/posix-timers.c index 7534069f6033..fbe0bc05f122 100644 --- a/kernel/time/posix-timers.c +++ b/kernel/time/posix-timers.c @@ -582,7 +582,7 @@ static struct k_itimer *__lock_timer(timer_t timer_id, unsigned long *flags) * 3) Remove from the hash under hash_lock * 4) Call RCU for removal after the grace period * - * Holding rcu_read_lock() accross the lookup ensures that + * Holding rcu_read_lock() across the lookup ensures that * the timer cannot be freed. * * The lookup validates locklessly that timr::it_signal == diff --git a/tools/testing/selftests/net/psock_tpacket.c b/tools/testing/selftests/net/psock_tpacket.c index 404a2ce759ab..221270cee3ea 100644 --- a/tools/testing/selftests/net/psock_tpacket.c +++ b/tools/testing/selftests/net/psock_tpacket.c @@ -12,7 +12,7 @@ * * Datapath: * Open a pair of packet sockets and send resp. receive an a priori known - * packet pattern accross the sockets and check if it was received resp. + * packet pattern across the sockets and check if it was received resp. * sent correctly. Fanout in combination with RX_RING is currently not * tested here. * diff --git a/tools/testing/selftests/powerpc/vphn/test-vphn.c b/tools/testing/selftests/powerpc/vphn/test-vphn.c index 81d3069ffb84..9e4261b061fb 100644 --- a/tools/testing/selftests/powerpc/vphn/test-vphn.c +++ b/tools/testing/selftests/powerpc/vphn/test-vphn.c @@ -275,7 +275,7 @@ static struct test { } }, { - /* Parse a 32-bit value split accross two consecutives 64-bit + /* Parse a 32-bit value split across two consecutive 64-bit * input values. */ "vphn: 16-bit value followed by 2 x 32-bit values", -- Gitee From 4b50eb516e7d5f58a34a866b9d169bf9abf12266 Mon Sep 17 00:00:00 2001 From: enkilee Date: Mon, 14 Jul 2025 10:03:44 +0800 Subject: [PATCH 2/2] fix typos Signed-off-by: enkilee --- tools/testing/selftests/powerpc/vphn/test-vphn.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/powerpc/vphn/test-vphn.c b/tools/testing/selftests/powerpc/vphn/test-vphn.c index 9e4261b061fb..68e3e81c73bc 100644 --- a/tools/testing/selftests/powerpc/vphn/test-vphn.c +++ b/tools/testing/selftests/powerpc/vphn/test-vphn.c @@ -104,8 +104,8 @@ static struct test { } }, { - /* Parsing the next 16-bit value out of the next 64-bit input - * value. + /* Parsing the next 16-bit value out of the next 64-bit + * input value. */ "vphn: 5 x 16-bit values", { -- Gitee