Engineering:Hardware bug
A hardware bug is a defect in the design, manufacture, or operation of computer hardware that causes incorrect operation. It is the counterpart of software bugs which refer to flaws in the code which operates computers, and is the original context in which "bug" was used to refer to such flaws. Intermediate between hardware and software are microcode and firmware which may also have such defects. In common usage, a bug is subtly different from a "glitch" which may be more transient than fundamental, and somewhat different from a "quirk" which may be considered useful or intrinsic. Errata (corrections to the documentation) may be published by the manufacturer to reflect such unintended operation, and "errata" is sometimes used as a term for the flaws themselves.
History
The Middle English word bugge is the basis for the terms "bugbear" and "bugaboo" as terms used for a monster.[1]
The term "bug" to describe defects has been a part of engineering jargon since the 1870s and predates electronic computers and computer software; it may have originally been used in hardware engineering to describe mechanical malfunctions. For instance, Thomas Edison wrote the following words in a letter to an associate in 1878:
It has been just so in all of my inventions. The first step is an intuition, and comes with a burst, then difficulties arise—this thing gives out and [it is] then that "Bugs"—as such little faults and difficulties are called—show themselves and months of intense watching, study and labor are requisite before commercial success or failure is certainly reached.[2]
Baffle Ball, the first mechanical pinball game, was advertised as being "free of bugs" in 1931.[3] Problems with military gear during World War II were referred to as bugs (or glitches).[4] In the 1940 film, Flight Command, a defect in a piece of direction-finding gear is called a "bug".[citation needed] In a book published in 1942, Louise Dickinson Rich, speaking of a powered ice cutting machine, said, "Ice sawing was suspended until the creator could be brought in to take the bugs out of his darling."[5]
Isaac Asimov used the term "bug" to relate to issues with a robot in his short story "Catch That Rabbit", published in 1944.
The term "bug" was used in an account by computer pioneer Grace Hopper, who publicized the cause of a malfunction in an early electromechanical computer.[6] A typical version of the story is:
In 1946, when Hopper was released from active duty, she joined the Harvard Faculty at the Computation Laboratory where she continued her work on the Mark II and Mark III. Operators traced an error in the Mark II to a moth trapped in a relay, coining the term bug. This bug was carefully removed and taped to the log book. Stemming from the first bug, today we call errors or glitches in a program a bug.[7]
Hopper did not find the bug, as she readily acknowledged. The date in the log book was September 9, 1947.[8][9][10] The operators who found it, including William "Bill" Burke, later of the Naval Weapons Laboratory, Dahlgren, Virginia,[11] were familiar with the engineering term and amusedly kept the insect with the notation "First actual case of bug being found." Hopper loved to recount the story.[12] This log book, complete with attached moth, is part of the collection of the Smithsonian National Museum of American History.[9]
Unintended operation
Sometimes users take advantage of the unintended or undocumented operation of hardware to serve some purpose, in which case a flaw may be considered a feature. This gives rise to the often ironically employed acronym INABIAF, "It's Not A Bug It's A Feature".[13] For example, undocumented instructions, known as illegal opcodes, on the MOS Technology 6510 of the Commodore 64 and MOS Technology 6502 of the Apple II computers are sometimes utilized. Similarly programmers for the Amiga took advantage of the unintended operation of its coprocessors to produce new effects or optimizations.[citation needed]
Security vulnerabilities
Some flaws in hardware may lead to security vulnerabilities where memory protection or other features fail to work properly. Starting in 2017 a series of security vulnerabilities were found in the implementations of speculative execution on common processor architectures that allowed a violation of privilege level.
In 2019 researchers discovered that a manufacturer debugging mode, known as VISA, had an undocumented feature on Intel Platform Controller Hubs, known as chipsets, which made the mode accessible with a normal motherboard possibly leading to a security vulnerability.[14]
Pentium bugs
The Intel Pentium series of CPUs had two well-known bugs discovered after it was brought to market, the FDIV bug affecting floating point division which resulted in a recall in 1994, and the F00F bug discovered in 1997 which causes the processor to stop operating until rebooted.
See also
References
- ↑ Computerworld staff (September 3, 2011). "Moth in the machine: Debugging the origins of 'bug'". Computerworld. Archived from the original on August 25, 2015. https://web.archive.org/web/20150825040938/http://www.computerworld.com/article/2515435/app-development/moth-in-the-machine--debugging-the-origins-of--bug-.html.
- ↑ Edison to Puskas, 13 November 1878, Edison papers, Edison National Laboratory, U.S. National Park Service, West Orange, N.J., cited in Hughes, Thomas Parke (1989). American Genesis: A Century of Invention and Technological Enthusiasm, 1870–1970. Penguin Books. p. 75. ISBN 978-0-14-009741-2. https://books.google.com/books?id=0r-ml88EynYC&pg=PA75.
- ↑ "Baffle Ball". Internet Pinball Database. http://www.ipdb.org/machine.cgi?gid=129. "(See image of advertisement in reference entry)"
- ↑ "Modern Aircraft Carriers are Result of 20 Years of Smart Experimentation". Life: 25. June 29, 1942. Archived from the original on June 4, 2013. https://web.archive.org/web/20130604220016/http://books.google.com/books?id=KlAEAAAAMBAJ&lpg=PA1&dq=life%20magazine%20june%2029%201942&pg=PA25#v=onepage&q&f=true. Retrieved November 17, 2011.
- ↑ Dickinson Rich, Louise (1942), We Took to the Woods, JB Lippincott Co, p. 93, OCLC 405243, archived from the original on March 16, 2017, https://web.archive.org/web/20170316164959/https://books.google.com/books?id=PT0zAQAAIAAJ.
- ↑ FCAT NRT Test, Harcourt, March 18, 2008
- ↑ "Danis, Sharron Ann: "Rear Admiral Grace Murray Hopper"". ei.cs.vt.edu. February 16, 1997. http://ei.cs.vt.edu/~history/Hopper.Danis.html. Retrieved January 31, 2010.
- ↑ "Bug ", The Jargon File, ver. 4.4.7. Retrieved June 3, 2010.
- ↑ 9.0 9.1 "Log Book With Computer Bug ", National Museum of American History, Smithsonian Institution.
- ↑ "The First "Computer Bug", Naval Historical Center. But note the Harvard Mark II computer was not complete until the summer of 1947.
- ↑ IEEE Annals of the History of Computing, Vol 22 Issue 1, 2000
- ↑ James S. Huggins. "First Computer Bug". Jamesshuggins.com. http://www.jamesshuggins.com/h/tek1/first_computer_bug.htm. Retrieved September 24, 2012.
- ↑ Nicholas Carr. "'IT'S NOT A BUG, IT'S A FEATURE.' TRITE—OR JUST RIGHT?". Wired. https://www.wired.com/story/its-not-a-bug-its-a-feature/.
- ↑ Lucian Armasu. "Intel Chipsets' Undocumented Feature Can Help Hackers Steal Data". Tom's Hardware. https://www.tomshardware.com/news/intel-visa-undocumented-feature-chipsets-cpus,38954.html.
Original source: https://en.wikipedia.org/wiki/Hardware bug.
Read more |