)]}' { "commit": "08ee5962fadfad11a256edcd92d7a71d55db6890", "tree": "4ca788b982fec1a11ffa993cfdade99c615117df", "parents": [ "bf1584690549f59dbc98cc5278649a8dfd1b4aea" ], "author": { "name": "Qiuxu Zhuo", "email": "qiuxu.zhuo@intel.com", "time": "Tue Jun 18 09:19:40 2019 +0800" }, "committer": { "name": "Andi Kleen", "email": "ak@linux.intel.com", "time": "Tue Jul 16 17:15:50 2019 -0700" }, "message": "Avoid optimizing out the access to the injected location by compiler\n\nThe \"SRAR DCU\" test case failed on a CLX-AP server. It\u0027s root caused\nthat the gcc v8.2.1 optimized out the access to the injected location.\n\nMove the \"total\" from being a local variable to a global to avoid the\noptimization by the compiler. Consequently, it can make sure the poisoned\ndata is consumed to trigger the machine check recovery process.\n\nBefore applying the patch:\n run : ./srar_recovery.sh -d\n log : The poisoned process can\u0027t be killed by kernel automatically. Test fails!\n\nAfter applying the patch:\n run : ./srar_recovery.sh -d\n log : ./srar_recovery.sh: line 80: 11650 Broken pipe tail -f trigger --pid\u003d$$\n 11651 Bus error (core dumped) | victim $1 \u003e log\n SRAR/DCU test passes!\n\nSigned-off-by: Qiuxu Zhuo \u003cqiuxu.zhuo@intel.com\u003e\nSigned-off-by: Tony Luck \u003ctony.luck@intel.com\u003e\nSigned-off-by: Andi Kleen \u003cak@linux.intel.com\u003e\n", "tree_diff": [ { "type": "modify", "old_id": "31f868ab75f12820b70ae185b94207d9f52388d4", "old_mode": 33188, "old_path": "tools/victim/victim.c", "new_id": "5aa8c1e76b2a9d73fbc745761e1be98399f67a59", "new_mode": 33188, "new_path": "tools/victim/victim.c" } ] }