Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Killer poke

From Wikipedia, the free encyclopedia
Software means of causing computer hardware damage

Incomputer jargon, akiller poke is a method of inducing physicalhardware damage on a machine or itsperipherals by the insertion of invalid values, via, for example,BASIC'sPOKE command, into amemory-mapped controlregister. The term is typically used to describe a family of fairly well known tricks that can overload theanalog electronics in theCRTmonitors of computers lacking hardwaresanity checking (notable examples being theIBM Portable[1] andCommodore PET.)

Specific examples

[edit]

Zuse Z1/Z3

[edit]

TheZ1 (1938) andZ3 (1941) computers built byKonrad Zuse contained illegal sequences of instructions which damaged the hardware if executed by accident.[2]

Commodore PET

[edit]

ThePET-specific killer poke is connected to the architecture of that machine's video rasterizer circuits. In early PETs, writing a certain value to the memory address of a certainI/O register (POKE 59458,62[3]) made the machine able to display text and graphics on the screen 106% faster. This was accomplished by disabling a "wait to print to screen" safeguard designed to reduce static/noise by preventing the shared VRAM from being read by the display at the same time as it was being written to by the CPU. With this safeguard disabled, graphics could appear on the screen twice as fast, but small bits of static would also appear. Despite the static, some games designed for early PETs included this POKE in their source code in order to benefit from the faster graphics.[1]

When the PET range was revamped with updated hardware, the video rasterizer circuits were redesigned to run at a faster speed and without the need for a "wait to print" safeguard. Thus, the old POKE trick no longer resulted in faster graphics. Instead, performing the old trick on the new hardware led to strange behavior by the new video chip, which could causesignal contention and possibly damage the PET's integratedCRT monitor.[4] This is because the exact pin targeted by the POKE command used to control display timing, but in the upgraded video chip, that pin controlled the vertical sync. Thus, running the POKE on the newer hardware caused graphics to compress vertically, sometimes down to an extremely bright horizontal line. Fears that this anomaly mightburn in to the display led to the nickname "killer poke";[3] however, it is not known to have ever caused any permanent damage to the monitor.[5]

Commodore 1541 Disk Drive

[edit]

TheCommodore 64 had an optional external 5-1/4" floppy drive. TheCommodore 1541 contained a 6502 microprocessor which was used to runCommodore DOS and also to manage the drive mechanism. The drives stored data on 35 tracks (#0–34), and the stepper motor could be manually controlled through BASIC by PRINT#-ing "MEMORY-WRITE" commands to the drive (which correspond to the POKE command of BASIC, but write to the drive's internal memory and I/O registers, not those of the computer itself). If the drive was at either end of its range (track 0 or track 39) and it was commanded to continue moving, there was no software or firmware method to prevent drive damage. Continued "knocking" of the drive head against the stop would throw the mechanism out of alignment. The problem was exacerbated bycopy protection techniques that used non-standard disk formats with unusual track counts. TheCommodore 1571 had an optical head stop instead of a mechanical one.

TRS-80 Model I & III

[edit]

The originalTRS-80 andTRS-80 Model III had the ability to switch between a 32-character-wide display and a 64-character display. Doing so actuated a relay in the video hardware, accomplished by writing to a specific memory-mapped control register.[6] Programs that repeatedly switched between 32- and 64-character modes at high speed (either on purpose or accidentally) could permanently damage the video hardware.[citation needed] While this is not a single "killer poke", it demonstrates a softwarefailure mode that could permanently damage the hardware.

The TRS-80 Model I also has a similar cassette motor relay accessible via a memory poke command and could result in damaging the relay.

LG CD-ROM drives

[edit]

Certain models of LG CD-ROM drives with specific firmware used an abnormal command for "update firmware": the "clear buffer" command usually used on CD-RW drives. Linux uses this command to tell the difference between CD-ROM and CD-RW drives. Most CD-ROM drives dependably return an error for the unsupported CD-RW command, but the faulty drives interpreted it as "update firmware", causing them to stop working (or, in casual parlance, to be "bricked").[7]

Flash memory

[edit]

The resource of flash memory is large, but limited. Since writing to storage is an essential operation, most applications have enough privileges to exhaust the resource of flash chips within 24 hours by filling the storage enough to causewrite amplification and continuously rewriting a small file.[8]

MSi Laptops UEFI

[edit]

Systemd mounts variables used byUnified Extensible Firmware Interface onLinux system'ssysfs as writable by the root user of a system. As a result, it is possible for theroot user of a system to completely brick a system with a non-conforming UEFI implementation (specifically someMSi laptops) by using therm command to delete the/sys/firmware/efi/efivars/ directory, or recursively delete theroot directory.[9][better source needed]

See also

[edit]
  • Stuxnet, malware designed to cause physical wear in industrial centrifuges
  • Bricking, the act of misconfiguring a device so as to make it cease functioning
  • CIH (computer virus), a virus which corrupted the BIOS
  • Halt and Catch Fire, a less destructive operation which halts the CPU but can usually be recovered by power-cycling.

References

[edit]
  1. ^ab"Computing Myth #1: Software cannot damage hardware". Oldskooler Ramblings. 2 February 2006.Archived from the original on 23 February 2011. Retrieved28 December 2010.
  2. ^Rojas, Raúl (April–June 1997)."Konrad Zuse's Legacy: The Architecture of the Z1 and Z3"(PDF).IEEE Annals of the History of Computing.19 (2): 5–16 [9–10].doi:10.1109/85.586067.Archived(PDF) from the original on 3 July 2022. Retrieved3 July 2022. p. 10:There are a lot of details that the engineer designing the "microprogram" must keep in mind, otherwise short circuits can destroy the hardware. TheZ1 with its mechanical design was still more sensitive in this respect than theZ3. Even after it was completed, there were sequences of instructions that the programmer had to avoid in order not to damage the hardware. One of those sequences was inadvertently tried at theBerlin Museum of Technology and Transportation, which led to slight damaging of the reconstructed Z1 in 1994. (12 pages)
  3. ^ab"Commodore PET 2001 computer". oldcomputers.net.Archived from the original on 1 January 2011. Retrieved10 January 2011.
  4. ^Fachat, André."Killer Poke".PET index. 6502.org.Archived from the original on 9 November 2010. Retrieved10 November 2010.
  5. ^The Killer POKE.Archived from the original on 11 December 2021.
  6. ^"80-GRAFIX Manual".Vintagecomputer.net. 1980.Archived from the original on 27 February 2016. Retrieved8 June 2015.
  7. ^"Re: LG CDRoms".newbie@linux-mandrake.com. The Mail Archive. 29 October 2003.Archived from the original on 30 September 2010. Retrieved29 December 2009.
  8. ^https://www.cs.unc.edu/~porter/pubs/fbrick-mobisys-2019.pdf[bare URL PDF]
  9. ^"Mount efivarfs read-only · Issue #2402 · systemd/systemd".GitHub. 21 January 2016.Archived from the original on 23 October 2016. Retrieved9 November 2016.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Killer_poke&oldid=1242927036"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp