lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+X5Wn52Ejf6FJO6_URxVs0f_XoBui7RvKVbcFak8K4cSZkf8g@mail.gmail.com>
Date:   Thu, 4 Jan 2018 20:51:27 -0500
From:   james harvey <jamespharvey20@...il.com>
To:     Tim Mouraveiko <tim.ml@...opper.com>
Cc:     Pavel Machek <pavel@....cz>,
        kernel list <linux-kernel@...r.kernel.org>
Subject: Re: Bricked x86 CPU with software?

On Thu, Jan 4, 2018 at 4:00 PM, Tim Mouraveiko <tim.ml@...opper.com> wrote:
> Pavel,
>
> As I mentioned before, I repeatedly and fully power-cycled the motherboard and reset BIOS
> and etc. It made no difference. I can see that the processor was not drawing any power. The
> software code behaved in a similar fashion on other processors, until I fixed it so that it would
> not kill any more processors.
>
> In case you are curious there was no overheating, no 100% utilization, no tampering with
> hardware (GPIO pins or anything of that sort), no overclocking and etc. No hardware issues
> or changes at all.
>
> Tim

To clarify, by "in a similar fashion on other processors", do you
actually mean you consistently bricked multiple CPUs using the same
code?  Or, was it just this one CPU that bricked, and it was just
acting buggy on other processors?

Unless you consistently bricked multiples, my bet is coincidence.  In
your original post, "There were signs that something was not right,
that the code was causing unusual behavior, which is what I was
debugging." makes me think it was a defective CPU but still
functional, and died as you were debugging/running the buggy code.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ