Intel® ISA Extensions
Use hardware-based isolation and memory encryption to provide more code protection in your solutions.
Announcements
Welcome to the Intel Community. If you get an answer you like, please mark it as an Accepted Solution to help others. Thank you!
For the latest information on Intel’s response to the Log4j/Log4Shell vulnerability, please see Intel-SA-00646

SDE RTM emulation - small issue

Craig_D_
Beginner
112 Views

A small discrepancy between the behavior of the SDE and the behavior of a real (Skylake) processor with regards to RTM emulation (with -rtm-mode full).  For access violations such as writing to read-only memory during a transaction, the SDE will allow the transaction to continue and not cause an abort until the transaction attempts to commit; whereas in a real processor, the access violation causes an immediate abort.  

Not a major issue but thought I'd document it here. 

0 Kudos
1 Reply
MICHAEL_G_Intel1
Employee
112 Views

Hi Craig

You are correct.

There is a discrepancy  between SDE and HW.

SDE will attempt to write to the memory only on commit of the transaction.

We will look into this issue and will solve it.

Regards,

Michael

 

Reply