AMD Confirms CPU Bug Found By DragonFly BSD's Matt Dillon


An anonymous reader writes “Matt Dillon of DragonFly BSD just announced that AMD confirmed a CPU bug he found. Matt quotes part of the mail exchange and it looks like ‘consecutive back-to-back pops and (near) return instructions can create a condition where the processor incorrectly updates the stack pointer.’ The specific manifestations in DragonFly were random segmentation faults under heavy load.”


Share on Google+

Read more of this story at Slashdot.

See the original article here:
AMD Confirms CPU Bug Found By DragonFly BSD's Matt Dillon

Upload Response

Your data will be stored in the mainframe. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.