Freddy, thank you for this old link. Here is more relevant one:
www-personal.umich.edu
"Navindra Umanee <navindra@cs.mcgill.ca> in comp.sys.intel, reported that the bug affects following byte sequences: 0xf0, 0x0f, 0xc7, 0xc8 -> lock: cmpxchg8b eax 0xf0, 0x0f, 0xc7, 0xc9 -> lock: cmpxchg8b ebx 0xf0, 0x0f, 0xc7, 0xca -> lock: cmpxchg8b ecx 0xf0, 0x0f, 0xc7, 0xcb -> lock: cmpxchg8b edx 0xf0, 0x0f, 0xc7, 0xcc -> lock: cmpxchg8b esp 0xf0, 0x0f, 0xc7, 0xcd -> lock: cmpxchg8b ebp 0xf0, 0x0f, 0xc7, 0xce -> lock: cmpxchg8b esi 0xf0, 0x0f, 0xc7, 0xcf -> lock: cmpxchg8b edi"
So, there are 8 (eight) bugs now! Looks like they are doing what all bugs do: fast reproduction and propagation! Enjoy:-) |