From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 96022C433EF for ; Thu, 7 Apr 2022 12:37:56 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245286AbiDGMjx (ORCPT ); Thu, 7 Apr 2022 08:39:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43964 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243439AbiDGMjx (ORCPT ); Thu, 7 Apr 2022 08:39:53 -0400 Received: from esa2.hgst.iphmx.com (esa2.hgst.iphmx.com [68.232.143.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 80AAD258440 for ; Thu, 7 Apr 2022 05:37:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1649335073; x=1680871073; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=dWSteLjWiW4FtRb9Atz/Sagv3btGwiSdR6lLsD/Kwnc=; b=Dx+Z3JwFkWOWmnuSP5ytFTu5vI/FXf1dg9JtefZcrNXcDCDm1oaZOWns LtlzH1v8YepRgldfwtL5/k51NPn08lOhGba4DTFElO40hCZUIYwUapI0h tUaCtWJf0bcyre4XYTD5mPwjaULUbJKawBCkQMAcGYp5xTKHRrg4fGAif dzC8VhAW9mRUnEJoC0Bpy8ITPNiNLjJw+zFNr8Rm908+q5Mvx86o+HscZ HhS6Sf2WbWz/S/RZAj+2rqg46mG0N/LXHW5ISYtf6lXi88K4aSnY+VW2f g1Ffb08x5SJqV+XquEPXe6o3/luWJ/K8rkg78DFImPFBTdMUHrwa7TgHR w==; X-IronPort-AV: E=Sophos;i="5.90,242,1643644800"; d="scan'208";a="301515549" Received: from h199-255-45-14.hgst.com (HELO uls-op-cesaep01.wdc.com) ([199.255.45.14]) by ob1.hgst.iphmx.com with ESMTP; 07 Apr 2022 20:37:51 +0800 IronPort-SDR: hruFQ5jRWBQ+wo847Jc7Un8JhEEM9TPpNVutdMzZ99Dhv3/2eo3ygx4C9jAuENdRk0nS2E5vWz dm7BYjPERBNqQUku8V8OwDemwqrFDtNpSE5MYPDTt6ionsNf0KDoaRvbTxJ2fUaaaznNDA6Abs iYFYXX5Eo2POhxB0pflikqz8tnLxLn03ZWy+PzW74tXqhiTTIFIwhfedSW97OZkeyIOygHs8M4 czsgOBux0GT7flaXGjQ+Cols96FL2sKGAHL3OG/Hq1XrqnDZUs8SjejPkDXBFdYpumk8grlZVb CD0yCQgUs/7wkoqdIF/wjjs+ Received: from uls-op-cesaip01.wdc.com ([10.248.3.36]) by uls-op-cesaep01.wdc.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 07 Apr 2022 05:09:22 -0700 IronPort-SDR: Ih+MLo5kCbvudQKEzS/QPGuRbmtlPrk1Qp3cZLBuKPGTl3T/1uuRWmlOM0ipE7NQcI97d8T7QW yIKMXG5iBP9LobgbeTxCOX6KP/07VMiI8ikHNLLTMLqI/ipc7cCF51c3sIvE+kUBC2aA61HhKI rnBB8O7ak9AeIy5Z0SM/WUliNfM3fIWR4RaMssBGh/ii4S4o16fEyXxc65wwmslXzoeV4mODOl ln6SbjtIiL/qDkuXJ86pbSZv9dIyBGLJP/gtmJqSZV8Iqq0qvvTJ2MsyqgkDI/Fkw4avWPgaXX nVM= WDCIronportException: Internal Received: from usg-ed-osssrv.wdc.com ([10.3.10.180]) by uls-op-cesaip01.wdc.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 07 Apr 2022 05:37:52 -0700 Received: from usg-ed-osssrv.wdc.com (usg-ed-osssrv.wdc.com [127.0.0.1]) by usg-ed-osssrv.wdc.com (Postfix) with ESMTP id 4KZ1B73YF8z1SVny for ; Thu, 7 Apr 2022 05:37:51 -0700 (PDT) Authentication-Results: usg-ed-osssrv.wdc.com (amavisd-new); dkim=pass reason="pass (just generated, assumed good)" header.d=opensource.wdc.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d= opensource.wdc.com; h=content-transfer-encoding:mime-version :x-mailer:message-id:date:subject:to:from; s=dkim; t=1649335071; x=1651927072; bh=dWSteLjWiW4FtRb9Atz/Sagv3btGwiSdR6lLsD/Kwnc=; b= rbRtodQe7TtfJ1ibk9aTFjNohEoMrD2I8SO6bsdJmcgl8IGo1JKI1sR+yYdXHR5i RsdJoH024YoiWvsa1ZzaqdNc8lZQz0KsnnzXAr14QJmkmW81EG72/WYQENjouRoi lQPo0pi8PYLa0NcEhHSF8zc8mTb5LOSotqnKkdhgEfwkFBS0cySS40scE4nxr68f +GoNtkFqAjHS3McUrjiQLafZuxyMu/uTaQBmhpYwmDpC/27viA43ku17YQu4PCJq NXCkR/dQs5ht6xX/HWSBtS2o4AmICSu3WpKT9BUiJiWpU9L65iMIbFyA0ff3kAqg odzsAMR8WZ10MCJFrHlNWw== X-Virus-Scanned: amavisd-new at usg-ed-osssrv.wdc.com Received: from usg-ed-osssrv.wdc.com ([127.0.0.1]) by usg-ed-osssrv.wdc.com (usg-ed-osssrv.wdc.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id kLBB3BBNkiWm for ; Thu, 7 Apr 2022 05:37:51 -0700 (PDT) Received: from washi.fujisawa.hgst.com (washi.fujisawa.hgst.com [10.149.53.254]) by usg-ed-osssrv.wdc.com (Postfix) with ESMTPSA id 4KZ1B62N80z1Rvlx; Thu, 7 Apr 2022 05:37:50 -0700 (PDT) From: Damien Le Moal To: linux-ide@vger.kernel.org, Jonathan Corbet , linux-doc@vger.kernel.org Cc: Sergey Shtylyov Subject: [PATCH 0/5] libata.force improvements Date: Thu, 7 Apr 2022 21:37:43 +0900 Message-Id: <20220407123748.1170212-1-damien.lemoal@opensource.wdc.com> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-doc@vger.kernel.org This patch series improves the usefulness of the libata.force kernel boot parameters to facilitate field debugging of ata drives and adapter issues by extending the range of horkage flags and link flags that can be controlled. The first patch is a simple cleanup of the drive blacklist array. Patch 2 refactors the declaration of the force_tbl array defining the possible values that libata.force can take. Patch 3 and 4 extend this array adding most horkage flags and one link flag. Finally, patch 5 updates the kernel documentation reflecting these changes. Damien Le Moal (5): ata: libata-core: cleanup ata_device_blacklist ata: libata-core: Refactor force_tbl definition ata: libata-core: Improve link flags forced settings ata: libata-core: Allow forcing most horkage flags doc: admin-guide: Update libata kernel parameters .../admin-guide/kernel-parameters.txt | 71 +++-- drivers/ata/libata-core.c | 271 +++++++++++------- 2 files changed, 217 insertions(+), 125 deletions(-) --=20 2.35.1