Feeds

Intel disables hot new TSX tech in early Broadwells and Haswells

Attention devs: this one weird tick might just bork your boxen

Choosing a cloud hosting partner with confidence

One of Intel's new ways to make software go faster is called Transactional Synchronization Extensions (TSX), an innovation that gives developers fine control over how multi-threaded code uses a CPU's resources.

TSX is a reasonably big deal, because as Intel never tires of pointing out it long-ago decided that grunt alone is not the way to keep Moore's Law alive. Chipzilla instead decided that cleverness is the way to go, hence today's multi-core chips and innovations like TSX that allow developers to use just about every cycle they offer.

So far so good … except for one small problem first noticed by Techreport, namely that TSX is broken in early batches of CPUs that are supposed to offer the feature.

The problem is described in this errata document (PDF) for the Xeon E3-1200 v3 Product Family. Errata are Intel's notes about chip performance.

The one for TSX offers the following advice:

Problem: Under a complex set of internal timing conditions and system events, software using the Intel TSX instructions may result in unpredictable system behavior. Implication: This erratum may result in unpredictable system behavior. Workaround: It is possible for the BIOS to contain a workaround for this erratum.

That workaround is a motherboard firmware update that, once installed, pushes a microcode patch to the processor to simply turn TSX off. Once it's off, so is the chance of “unpredictable system behavior”.

Intel's saying the workaround, and the bug, are not a big deal and won't be present in Haswell products once they ship in volume. That will happen with the forthcoming Haswell-EX, an 18-to-20-core bruiser expected to land in early 2015.

Chipzilla's also advising that you can, if you choose to do so, tweak firmware so that TSX will work in current CPUs. With “a complex set of internal timing conditions and system events” required to trigger the bug, that may well mean that developers can at least play with TSX in non-production environments. Which may well be the dominant use for the technology at this point in its life anyway. ®

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Tim Cook: The classic iPod HAD to DIE, and this is WHY
Apple, er, couldn’t get the parts for HDD models
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.