AMD cpu bug update -- AMD confirms!
Matthew Dillon
dillon at apollo.backplane.com
Mon Mar 5 11:27:44 PST 2012
AMD has confirmed the cpu bug that I analyzed. I am going to quote
the first paragraph. They gave me some more info and will be updating
their revision guide. To avoid any confusion (so they can finalize their
wording for the entry they will be putting in the revision guide) I'm
just including the confirmation here.
quote>>
"AMD has taken your example and also analyzed the segmentation fault and
the fill_sons_in_loop code. We confirm that you have found an erratum
with som e AMD processor families. The specific compiled version of
the fill_sons_in_loop code, through a very specific sequence of
consecutive back-to-back pops and (near) return instructions, can
create a condition where the process or incorrectly updates the
stack pointer."
<<endquote
We exchanged a few emails to try to come up with a good test case.
Owing to the difficulty of reproducing the bug I constructed a
fully bootable DFly operating system & test case USB image and
verified that the bug was present on my test box using that image.
AMD was then able to reproduce the bug using that image on their own
machines. Over the last few months they have been working through
the possibilities and today emailed me the confirmation that it was,
indeed, a cpu bug.
I'm pretty stoked... it isn't every day that a guy like me gets to
find an honest-to-god hardware bug in a major cpu!
-Matt
Matthew Dillon
<dillon at backplane.com>
More information about the Kernel
mailing list