1. 07 6月, 2008 5 次提交
  2. 06 6月, 2008 1 次提交
  3. 05 6月, 2008 2 次提交
  4. 04 6月, 2008 1 次提交
  5. 30 5月, 2008 1 次提交
  6. 27 5月, 2008 1 次提交
    • E
      ext4: enable barriers by default · 571640ca
      Eric Sandeen 提交于
      I can't think of any valid reason for ext4 to not use barriers when
      they are available;  I believe this is necessary for filesystem
      integrity in the face of a volatile write cache on storage.
      
      An administrator who trusts that the cache is sufficiently battery-
      backed (and power supplies are sufficiently redundant, etc...)
      can always turn it back off again.
      
      SuSE has carried such a patch for ext3 for quite some time now.
      
      Also document the mount option while we're at it.
      Signed-off-by: NEric Sandeen <sandeen@redhat.com>
      Signed-off-by: NMingming Cao <cmm@us.ibm.com>
      Signed-off-by: N"Theodore Ts'o" <tytso@mit.edu>
      571640ca
  7. 25 5月, 2008 2 次提交
  8. 23 5月, 2008 1 次提交
  9. 21 5月, 2008 1 次提交
  10. 15 5月, 2008 4 次提交
  11. 14 5月, 2008 2 次提交
  12. 13 5月, 2008 2 次提交
  13. 12 5月, 2008 2 次提交
  14. 07 5月, 2008 2 次提交
  15. 06 5月, 2008 3 次提交
  16. 05 5月, 2008 2 次提交
  17. 02 5月, 2008 4 次提交
  18. 01 5月, 2008 1 次提交
  19. 30 4月, 2008 3 次提交
    • T
      debugobjects: add documentation · 691cc54c
      Thomas Gleixner 提交于
      Add a DocBook for debugobjects.
      Signed-off-by: NThomas Gleixner <tglx@linutronix.de>
      Acked-by: NIngo Molnar <mingo@elte.hu>
      Cc: Greg KH <greg@kroah.com>
      Cc: Randy Dunlap <randy.dunlap@oracle.com>
      Cc: Kay Sievers <kay.sievers@vrfy.org>
      Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      691cc54c
    • T
      infrastructure to debug (dynamic) objects · 3ac7fe5a
      Thomas Gleixner 提交于
      We can see an ever repeating problem pattern with objects of any kind in the
      kernel:
      
      1) freeing of active objects
      2) reinitialization of active objects
      
      Both problems can be hard to debug because the crash happens at a point where
      we have no chance to decode the root cause anymore.  One problem spot are
      kernel timers, where the detection of the problem often happens in interrupt
      context and usually causes the machine to panic.
      
      While working on a timer related bug report I had to hack specialized code
      into the timer subsystem to get a reasonable hint for the root cause.  This
      debug hack was fine for temporary use, but far from a mergeable solution due
      to the intrusiveness into the timer code.
      
      The code further lacked the ability to detect and report the root cause
      instantly and keep the system operational.
      
      Keeping the system operational is important to get hold of the debug
      information without special debugging aids like serial consoles and special
      knowledge of the bug reporter.
      
      The problems described above are not restricted to timers, but timers tend to
      expose it usually in a full system crash.  Other objects are less explosive,
      but the symptoms caused by such mistakes can be even harder to debug.
      
      Instead of creating specialized debugging code for the timer subsystem a
      generic infrastructure is created which allows developers to verify their code
      and provides an easy to enable debug facility for users in case of trouble.
      
      The debugobjects core code keeps track of operations on static and dynamic
      objects by inserting them into a hashed list and sanity checking them on
      object operations and provides additional checks whenever kernel memory is
      freed.
      
      The tracked object operations are:
      - initializing an object
      - adding an object to a subsystem list
      - deleting an object from a subsystem list
      
      Each operation is sanity checked before the operation is executed and the
      subsystem specific code can provide a fixup function which allows to prevent
      the damage of the operation.  When the sanity check triggers a warning message
      and a stack trace is printed.
      
      The list of operations can be extended if the need arises.  For now it's
      limited to the requirements of the first user (timers).
      
      The core code enqueues the objects into hash buckets.  The hash index is
      generated from the address of the object to simplify the lookup for the check
      on kfree/vfree.  Each bucket has it's own spinlock to avoid contention on a
      global lock.
      
      The debug code can be compiled in without being active.  The runtime overhead
      is minimal and could be optimized by asm alternatives.  A kernel command line
      option enables the debugging code.
      
      Thanks to Ingo Molnar for review, suggestions and cleanup patches.
      Signed-off-by: NThomas Gleixner <tglx@linutronix.de>
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      Cc: Greg KH <greg@kroah.com>
      Cc: Randy Dunlap <randy.dunlap@oracle.com>
      Cc: Kay Sievers <kay.sievers@vrfy.org>
      Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      3ac7fe5a
    • S
      Basic braille screen reader support · f7511d5f
      Samuel Thibault 提交于
      This adds a minimalistic braille screen reader support.  This is meant to
      be used by blind people e.g.  on boot failures or when / cannot be mounted
      etc and thus the userland screen readers can not work.
      
      [akpm@linux-foundation.org: fix exports]
      Signed-off-by: NSamuel Thibault <samuel.thibault@ens-lyon.org>
      Cc: Jiri Kosina <jikos@jikos.cz>
      Cc: Dmitry Torokhov <dtor@mail.ru>
      Acked-by: NAlan Cox <alan@redhat.com>
      Cc: Randy Dunlap <randy.dunlap@oracle.com>
      Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      f7511d5f