summaryrefslogtreecommitdiffstats
path: root/include
diff options
context:
space:
mode:
authorKurt Garloff <garloff@suse.de>2009-06-24 14:32:11 -0700
committerIngo Molnar <mingo@elte.hu>2009-06-25 22:06:11 +0200
commit5211a242d0cbdded372aee59da18f80552b0a80a (patch)
tree5d2a853e538b8478648a57efe94ef049e76e13e6 /include
parent9c26f52b900f7207135bafc8789e1a4f5d43e096 (diff)
downloadlinux-5211a242d0cbdded372aee59da18f80552b0a80a.tar.gz
linux-5211a242d0cbdded372aee59da18f80552b0a80a.tar.bz2
linux-5211a242d0cbdded372aee59da18f80552b0a80a.zip
x86: Add sysctl to allow panic on IOCK NMI error
This patch introduces a new sysctl: /proc/sys/kernel/panic_on_io_nmi which defaults to 0 (off). When enabled, the kernel panics when the kernel receives an NMI caused by an IO error. The IO error triggered NMI indicates a serious system condition, which could result in IO data corruption. Rather than contiuing, panicing and dumping might be a better choice, so one can figure out what's causing the IO error. This could be especially important to companies running IO intensive applications where corruption must be avoided, e.g. a bank's databases. [ SuSE has been shipping it for a while, it was done at the request of a large database vendor, for their users. ] Signed-off-by: Kurt Garloff <garloff@suse.de> Signed-off-by: Roberto Angelino <robertangelino@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de> Cc: "Eric W. Biederman" <ebiederm@xmission.com> LKML-Reference: <20090624213211.GA11291@kroah.com> Signed-off-by: Ingo Molnar <mingo@elte.hu>
Diffstat (limited to 'include')
-rw-r--r--include/linux/kernel.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/kernel.h b/include/linux/kernel.h
index fac104e7186a..d6320a3e8def 100644
--- a/include/linux/kernel.h
+++ b/include/linux/kernel.h
@@ -303,6 +303,7 @@ extern int oops_in_progress; /* If set, an oops, panic(), BUG() or die() is in
extern int panic_timeout;
extern int panic_on_oops;
extern int panic_on_unrecovered_nmi;
+extern int panic_on_io_nmi;
extern const char *print_tainted(void);
extern void add_taint(unsigned flag);
extern int test_taint(unsigned flag);