IlluminAce
New Member
- Joined
- Aug 6, 2011
- Messages
- 46 (0.01/day)
- Location
- UK
System Name | Ace2 |
---|---|
Processor | Intel i7 2600 |
Motherboard | ASRock Extreme4 Gen3 |
Cooling | Zalman CNPS10x Extreme |
Memory | Corsair Vengeance LP 16GB (4x4) |
Video Card(s) | Asus HD 6970 DirectCUII |
Storage | 4x Samsung 1TB 7.2krpm |
Display(s) | 1x 24" 16:10, 1x 20" 16:10, 3x 19" 5:4 |
Case | Fractal Design R3 |
Audio Device(s) | TBD |
Power Supply | Corsair HX850W |
Software | Debian dom0 (on Xen hypervisor) |
AMD's CPU range has a problem updating its stack pointer. Ouch!
Read all about it.
This has been confirmed on one of the Phenom II X4 range's CPUs and even on a high-end Opteron. AMD's confirmation indicates it probably affects a nice range of their CPUs. The problem comes to light only in a very specific case - the best I can ascertain, it's when you're in a rather specific section of the stack (possibly requiring stack randomization), and when a very particular situation arises with a particular arrangement of assembly calls involving a sequence of pops (so really in deep recursion) and some NOPs.
It was found by the man behind DragonFly BSD - a pretty nifty fork of OpenBSD which has undergone extensive kernel rewriting, so this guy knew his stuff, and put the requisite time in (over the course of a year) to track this blighter of a bug down. Kudos to Matthew Dillon for his efforts.
Before everybody dashes out to buy Intels, AFAIK the bug has only exhibited (or been noticed, at least) on DragonFly BSD in a particular method called by the GCC implementation in use there, and only very irregularly at that. So you should be safe
*segfault*
Read all about it.
This has been confirmed on one of the Phenom II X4 range's CPUs and even on a high-end Opteron. AMD's confirmation indicates it probably affects a nice range of their CPUs. The problem comes to light only in a very specific case - the best I can ascertain, it's when you're in a rather specific section of the stack (possibly requiring stack randomization), and when a very particular situation arises with a particular arrangement of assembly calls involving a sequence of pops (so really in deep recursion) and some NOPs.
It was found by the man behind DragonFly BSD - a pretty nifty fork of OpenBSD which has undergone extensive kernel rewriting, so this guy knew his stuff, and put the requisite time in (over the course of a year) to track this blighter of a bug down. Kudos to Matthew Dillon for his efforts.
Before everybody dashes out to buy Intels, AFAIK the bug has only exhibited (or been noticed, at least) on DragonFly BSD in a particular method called by the GCC implementation in use there, and only very irregularly at that. So you should be safe
*segfault*
Last edited: