85:
Sometimes users take advantage of the unintended or undocumented operation of hardware to serve some purpose, in which case a flaw may be considered a feature. This gives rise to the often ironically employed acronym INABIAF, "It's Not A Bug It's A Feature". For example, undocumented instructions,
139:
Platform
Controller Hubs, known as chipsets, which made the mode accessible with a normal motherboard possibly leading to a security vulnerability.
124:
or other features fail to work properly. Starting in 2017 a series of security vulnerabilities were found in the implementations of
208:
237:
46:
which describes an undesirable behavior as more quick, transient and repeated than constant, and different from a
135:
In 2019 researchers discovered that a manufacturer debugging mode, known as VISA, had an undocumented feature on
232:
129:
125:
115:
106:
took advantage of the unintended operation of its coprocessors to produce new effects or optimizations.
56:, corrections to the documentation, may be published by the manufacturer to describe hardware bugs, and
80:
95:
87:
121:
69:
25:
21:
156:
152:
189:
99:
50:
which is a behavior that may be considered useful even though not intentionally designed.
151:
series of CPUs had two well-known bugs discovered after it was brought to market, the
226:
168:
91:
32:
159:
discovered in 1997 which causes the processor to stop operating until rebooted.
155:
affecting floating point division which resulted in a recall in 1994, and the
36:
148:
53:
43:
209:"Intel Chipsets' Undocumented Feature Can Help Hackers Steal Data"
136:
120:
Some flaws in hardware may lead to security vulnerabilities where
103:
102:
computers are sometimes utilized. Similarly programmers for the
128:
on common processor architectures that allowed a violation of
190:"'IT'S NOT A BUG, IT'S A FEATURE.' TRITE—OR JUST RIGHT?"
60:
is sometimes used as a term for the bugs themselves.
8:
180:
7:
31:It is the hardware counterpart of
14:
86:known as illegal opcodes, on the
70:Bug (engineering) § History
207:Lucian Armasu (29 March 2019).
1:
254:
113:
78:
67:
42:A bug is different from a
110:Security vulnerabilities
126:speculative execution
116:Hardware security bug
68:Further information:
238:Engineering concepts
81:Undocumented feature
75:Unintended operation
96:MOS Technology 6502
88:MOS Technology 6510
122:memory protection
26:computer hardware
245:
217:
216:
204:
198:
197:
185:
253:
252:
248:
247:
246:
244:
243:
242:
223:
222:
221:
220:
206:
205:
201:
188:Nicholas Carr.
187:
186:
182:
177:
165:
145:
130:privilege level
118:
112:
83:
77:
72:
66:
12:
11:
5:
251:
249:
241:
240:
235:
225:
224:
219:
218:
213:Tom's Hardware
199:
179:
178:
176:
173:
172:
171:
164:
161:
144:
141:
114:Main article:
111:
108:
79:Main article:
76:
73:
65:
62:
35:, a defect in
13:
10:
9:
6:
4:
3:
2:
250:
239:
236:
234:
233:Hardware bugs
231:
230:
228:
214:
210:
203:
200:
195:
191:
184:
181:
174:
170:
167:
166:
162:
160:
158:
154:
150:
142:
140:
138:
133:
131:
127:
123:
117:
109:
107:
105:
101:
97:
93:
89:
82:
74:
71:
63:
61:
59:
55:
51:
49:
45:
40:
38:
34:
29:
27:
23:
19:
212:
202:
193:
183:
169:Software bug
146:
143:Pentium bugs
134:
119:
92:Commodore 64
84:
57:
52:
47:
41:
33:software bug
30:
18:hardware bug
17:
15:
227:Categories
175:References
147:The Intel
163:See also
157:F00F bug
153:FDIV bug
100:Apple II
37:software
149:Pentium
98:of the
90:of the
64:History
58:errata
54:Errata
44:glitch
194:Wired
137:Intel
104:Amiga
48:quirk
20:is a
94:and
28:.
24:in
22:bug
229::
211:.
192:.
132:.
39:.
16:A
215:.
196:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.