Looks like AMD might have another CPU erratum on its hands.
DragonFly BSD creator Matthew Dillon wrote about the problem (and outlined his debugging efforts) last December. Yesterday, Dillon said he received confirmation from AMD that the issue he reported is, indeed, due to an erratum. His latest posting includes the following quote, attributed to AMD:
"AMD has taken your example and also analyzed the segmentation fault and the fill_sons_in_loop code. We confirm that you have found an erratum with som e [sic] AMD processor families. The specific compiled version of the fill_sons_in_loop code, through a very specific sequence of consecutive back-to-back pops and (near) return instructions, can create a condition where the process or incorrectly updates the stack pointer."
Dillon managed to reproduce the problem on systems with Phenom II X4 820 and Opteron 6168 processors. According to his December posting, the erratum leads to "a segmentation fault, bus fault, or other fault related to corrupt program state, causing the compiler to report an internal compiler failure." Dillon witnessed the problem when running the cc1 compiler from the gcc-4.4.7 system. (Thanks to Slashdot for the links.)
|Gigabyte SA-SBCAP3350 puts formidable power on a single board||5|
|Alphacool Eisblock HDX-2 and HDX-3 help M.2 SSDs beat the heat||1|
|Corsair Lighting Pro Expansion Kit lets builders turn up the lights||4|
|Adata D16750 power bank is tougher than the average juice pack||7|
|Deals of the week: fast memory, an AM4 motherboard, and more||12|
|Corsair RMx White Series PSUs take a walk on the snowy side||21|
|Intel crams 100 GFLOPS of neural-net inferencing onto a USB stick||38|
|Toshiba's XG5 1TB NVMe SSD reviewed||9|
|Microsoft and Johnson Controls put Cortana in a thermostat||22|