Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 07 Aug 2017 17:28:59 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-bugs@FreeBSD.org
Subject:   [Bug 219399] System panics after several hours of 14-threads-compilation orgies using poudriere on AMD Ryzen...
Message-ID:  <bug-219399-8-6esSwEkAah@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-219399-8@https.bugs.freebsd.org/bugzilla/>
References:  <bug-219399-8@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219399

--- Comment #213 from Nils Beyer <nbe@renzel.net> ---
(In reply to Nils Beyer from comment #212)

more statements:
---------------------------------------------------------------------------=
-----
I'm new to this myself (I work on the GPU SW side) but AFAICS there are at
least three different CPU families (1 from AMD) over the last decade which
require special treatment, basically making sure that no code gets executed
near the end of canonical user address space. The top of user process addre=
ss
space is the dividing line between the least privileged code and the
touch-it-and-die non-canonical address space.

Over time it seems that more "safe area" is required - presumably because e=
ach
new CPU generation pre-fetches further ahead than the last one. In a sense
Linux (and Windows I believe) got lucky by reserving a full guard page while
BSD allocated a smaller guard area. As a result BSD has had to bump the gua=
rd
area (to a full page) while other OSes did not.
---------------------------------------------------------------------------=
-----

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-219399-8-6esSwEkAah>