An anonymous reader writes “Matt Dillon of DragonFly BSD just announced that AMD confirmed a CPU bug he found. Matt quotes part of the mail exchange and it looks like ‘consecutive back-to-back pops and (near) return instructions can create a condition where the processor incorrectly updates the stack pointer.’ The specific manifestations in DragonFly were random segmentation faults under heavy load.”
Read more of this story at Slashdot.
See the original article here:
AMD Confirms CPU Bug Found By DragonFly BSD's Matt Dillon