From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 552A1C433F5 for ; Mon, 25 Apr 2022 01:34:51 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240172AbiDYBh2 (ORCPT ); Sun, 24 Apr 2022 21:37:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39640 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240159AbiDYBhZ (ORCPT ); Sun, 24 Apr 2022 21:37:25 -0400 Received: from esa4.hgst.iphmx.com (esa4.hgst.iphmx.com [216.71.154.42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AE8DAEDB59 for ; Sun, 24 Apr 2022 18:34:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1650850462; x=1682386462; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=koJDTDMLq54JWd9HeD7XD8paBg1Poz/+wyi8yWF470w=; b=hv3iJM+pNMSntlqLjzHeJgMK8Joy7e7hraBeGoF1qB76SA3uT0Jn0Lmp oKN0Z1oBUB5yURSCkfP98bQBPKBNxGKNCI8EQYOUHrt9Cv3N3ye4mcrPA XIJ2OgL3awngypjsHBsADDOoQyYa4BuS+AcN3aAXBEk8HJWjK6p0p5pUz ymtHLrMLVIhtR0sxe9M4uj15t4kVUvcuaN7BblgnNYhQLj9UNtY40PazV Mmk4PohlUl8VD4LAJzXBkzFYAFJFtky8WY8DnDIkL+IKfCCJygf1p4IE0 evibsLGy9JLumLfar2JNX9J+qj0LJrI08SonI5V8ToYwTdGkwLCVfmpq6 A==; X-IronPort-AV: E=Sophos;i="5.90,287,1643644800"; d="scan'208";a="197558808" Received: from h199-255-45-15.hgst.com (HELO uls-op-cesaep02.wdc.com) ([199.255.45.15]) by ob1.hgst.iphmx.com with ESMTP; 25 Apr 2022 09:34:20 +0800 IronPort-SDR: hJCD/nYlFDUlkUNlZuNH52It2N+y2cDnI0rBoSsVTaOrOUIjDk5t4Di3eS+kzmb8Dv3NsoL7e4 /dorohuWpxH5JcZvmUYziypdNTwhhP2tu1fN7GxKluibGWss1vzcvsq6t+kBn/CTYoumV2m/da 0tM7Gkv++tKiTh0G6UoJ+gYiZJNzBgMp6V4YcFXVkddKbZd1iaa17zUfF+hGlGn4na+uKwRW87 MDnbM7ZuavRXMwt9wGx5LBZvuo3Bu+ngu33HYbUkyqDlUA6MQOM7uFmIBkvRCxCamjjCuQCk+v /4Uc4ZZUQGir5KB7Sxbq3W9b Received: from uls-op-cesaip02.wdc.com ([10.248.3.37]) by uls-op-cesaep02.wdc.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 24 Apr 2022 18:04:34 -0700 IronPort-SDR: POa3wUmLVcP++A5s/hWF0xKNOAUa+7EQdHui39NqUa7z0oOkU9t8sQHJQzAOxFlLqCh5Exrep/ UnahOtxm05V/wafIkxR0ra38WVvtGfyInEvVoJXrcQ1inz5TyHAwqq4ErLbLgg19vkuD089E/A b266Lgc2LBS0j6hK+6KqgwvxieTcyxSjEv4D00rcVvAYkfv4HVP7E2HJzuEihcQ9G657UDqRCk ls/iCNUHxOgBtqZIg9apPNedGp9rNQrCExuqAr+QSePWwNwKFXOsm4XUD1OSjnSYJHSzKt+UTT AiY= WDCIronportException: Internal Received: from usg-ed-osssrv.wdc.com ([10.3.10.180]) by uls-op-cesaip02.wdc.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 24 Apr 2022 18:34:21 -0700 Received: from usg-ed-osssrv.wdc.com (usg-ed-osssrv.wdc.com [127.0.0.1]) by usg-ed-osssrv.wdc.com (Postfix) with ESMTP id 4KmncD47Swz1SVp0 for ; Sun, 24 Apr 2022 18:34:20 -0700 (PDT) Authentication-Results: usg-ed-osssrv.wdc.com (amavisd-new); dkim=pass reason="pass (just generated, assumed good)" header.d=opensource.wdc.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d= opensource.wdc.com; h=content-transfer-encoding:mime-version :x-mailer:message-id:date:subject:to:from; s=dkim; t=1650850460; x=1653442461; bh=koJDTDMLq54JWd9HeD7XD8paBg1Poz/+wyi8yWF470w=; b= LjiiMFJPQXszUP2UCl5q7KIJhBBrSh0RV1S8meF82USut/SwpeDHjUxYNt0ifqG5 COfO5PHCzxxIesOZL2D+e1NVu+mLqEZndR4Nfccz66qP/hIgDph0hYzqdJDHZ8LR 4UpaDEawjqGp/vzNTjhRQ+og9ZwgvJh5TGVirlpuXxJWM1dShHglwu0e/8U/LmPB sSLZsp0gJ5D6iWtxlSYTtXYlLJsVvTa6WPRV71HioGy1DTa5FWBfG45BIZxMR9fD LSFCxHYI36gQRAerZWuhuTyNBjvgWa4Ya691v/BP4jW6fyu5y9YRVB+W+n++YEvm 210zyCRgE0amQ2tsJ05h2w== X-Virus-Scanned: amavisd-new at usg-ed-osssrv.wdc.com Received: from usg-ed-osssrv.wdc.com ([127.0.0.1]) by usg-ed-osssrv.wdc.com (usg-ed-osssrv.wdc.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id KzxmuoYLOrsx for ; Sun, 24 Apr 2022 18:34:20 -0700 (PDT) Received: from washi.fujisawa.hgst.com (washi.fujisawa.hgst.com [10.149.53.254]) by usg-ed-osssrv.wdc.com (Postfix) with ESMTPSA id 4KmncC2KVrz1Rvlx; Sun, 24 Apr 2022 18:34:19 -0700 (PDT) From: Damien Le Moal To: linux-ide@vger.kernel.org, Jonathan Corbet , linux-doc@vger.kernel.org Cc: Sergey Shtylyov Subject: [PATCH v2 0/5] libata.force improvements Date: Mon, 25 Apr 2022 10:34:12 +0900 Message-Id: <20220425013417.3947791-1-damien.lemoal@opensource.wdc.com> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-ide@vger.kernel.org This patch series improves the usefulness of the libata.force kernel boot parameters to facilitate field debugging of ata drives and adapter issues by extending the range of horkage flags and link flags that can be controlled. The first patch is a simple cleanup of the drive blacklist array. Patch 2 refactors the declaration of the force_tbl array defining the possible values that libata.force can take. Patch 3 and 4 extend this array adding most horkage flags and one link flag. Finally, patch 5 updates the kernel documentation reflecting these changes. Changes from v1: * Changed force_lflag_on() macro name to force_lflag() in patch 2. Patch 3 introduce the on & onoff naming of the macro. * Updated the commit message of patch 2 and 3. * Removed underscores in the onoff horkage option names in patch 4. * Added review tags. Damien Le Moal (5): ata: libata-core: cleanup ata_device_blacklist ata: libata-core: Refactor force_tbl definition ata: libata-core: Improve link flags forced settings ata: libata-core: Allow forcing most horkage flags doc: admin-guide: Update libata kernel parameters .../admin-guide/kernel-parameters.txt | 71 +++-- drivers/ata/libata-core.c | 271 +++++++++++------- 2 files changed, 217 insertions(+), 125 deletions(-) --=20 2.35.1