From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id E7A5AE7E65A for ; Tue, 26 Sep 2023 19:12:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235667AbjIZTNB (ORCPT ); Tue, 26 Sep 2023 15:13:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54474 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235512AbjIZTNA (ORCPT ); Tue, 26 Sep 2023 15:13:00 -0400 Received: from esa.microchip.iphmx.com (esa.microchip.iphmx.com [68.232.154.123]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 506A19F for ; Tue, 26 Sep 2023 12:12:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1695755574; x=1727291574; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=8tLeQpd6HBXF6Dmd8f8FFd4DsDSrDptZyiryavvJHUQ=; b=OPds9GZHANKAptFjlAnFmiZam+JBdVX5NfxYuSO/yCCB+dPny2bBWbnX TJys+z+7bOgA5MXUp9hYxQe4sZH/0Jzpt1yUYhVpxdTtJDgVSl/FyFDoh +YSil4LwG153m+ygRyPqYhDEAQX+wQQn7e2kZeNcJCf+Psk0D4wiVf9gC jrN4PNr1oDCFuUvp1UXGAiDQ7Xgf0T/NueZU+b3qEXhxft2TqtrVdytzM 4WAVOdDm/ZtlWFwebQudIMiA7G4mfFbxtO+OkFK+6SytG+Dz6BsgAAN82 YivylM6wjybCZhFg2A87IfO0XAN8DeLeYZpSOv8TrszF3WKsbuSWVeYVl Q==; X-CSE-ConnectionGUID: 9rVscL9ZQ+ONqtmBXtxhZQ== X-CSE-MsgGUID: c4lIo9iESX60iZicCRWQCw== X-ThreatScanner-Verdict: Negative X-IronPort-AV: E=Sophos;i="6.03,178,1694761200"; d="scan'208";a="6593819" X-Amp-Result: SKIPPED(no attachment in message) Received: from unknown (HELO email.microchip.com) ([170.129.1.10]) by esa4.microchip.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 26 Sep 2023 12:12:53 -0700 Received: from chn-vm-ex04.mchp-main.com (10.10.85.152) by chn-vm-ex03.mchp-main.com (10.10.85.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.21; Tue, 26 Sep 2023 12:12:53 -0700 Received: from brunhilda.pdev.net (10.10.85.11) by chn-vm-ex04.mchp-main.com (10.10.85.152) with Microsoft SMTP Server id 15.1.2507.21 via Frontend Transport; Tue, 26 Sep 2023 12:12:53 -0700 From: Don Brace To: , CC: Subject: [PATCH v3 02/10] smartpqi: update module parameter descriptions Date: Tue, 26 Sep 2023 14:11:57 -0500 Message-ID: <20230926191206.627678-3-don.brace@microchip.com> X-Mailer: git-send-email 2.42.0.158.g94e83dcf5b In-Reply-To: <20230926191206.627678-1-don.brace@microchip.com> References: <20230926191206.627678-1-don.brace@microchip.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-man@vger.kernel.org Minor changes to the descriptions of the following module parameters: disable_device_id_wildcards disable_heartbeat disable_ctrl_shutdown expose_ld_first hide_vsep Reviewed-by: Scott Benesh Reviewed-by: Scott Teel Reviewed-by: Mike McGowen Reviewed-by: Kevin Barnett Signed-off-by: Don Brace --- man4/smartpqi.4 | 16 +++++++--------- 1 file changed, 7 insertions(+), 9 deletions(-) diff --git a/man4/smartpqi.4 b/man4/smartpqi.4 index 463976f88cea..428d79a19840 100644 --- a/man4/smartpqi.4 +++ b/man4/smartpqi.4 @@ -66,17 +66,17 @@ Allows BMIC and CISS commands to be passed through to the controller. .TP .BR disable_device_id_wildcards= { 0 | 1 } Disables support for device ID wildcards. -The default value is 0. +The default value is 0 (wildcards are enabled). .TP .BR disable_heartbeat= { 0 | 1 } Disables support for the controller's heartbeat check. This parameter is used for debugging purposes. -The default value is 0, leaving the controller's heartbeat check active. +The default value is 0 (the controller's heartbeat check is enabled). .TP .BR disable_ctrl_shutdown= { 0 | 1 } Disables support for shutting down the controller in the event of a controller lockup. -The default value is 0. +The default value is 0 (controller will be shut down). .TP .BR lockup_action= { none | reboot | panic } Specifies the action the driver takes when a controller @@ -94,14 +94,12 @@ parameter action .TE .TP .BR expose_ld_first= { 0 | 1 } -This option enables support for exposing logical devices to -the operating system before physical devices. -The default value is 0. +This option exposes logical devices to the OS before physical devices. +The default value is 0 (physical devices exposed first). .TP .BR hide_vsep= { 0 | 1 } -This option enables disabling exposure of the virtual SEP to the host. -This is usually associated with direct attached drives. -The default value is 0. +This option disables exposure of the virtual SEP to the OS. +The default value is 0 (virtual SEP is exposed). .SH FILES .SS Device nodes Logical drives are accessed via the SCSI disk driver -- 2.42.0.158.g94e83dcf5b