Halt and Catch Fire (computing)
Template:Short description {{#invoke:other uses|otheruses}} Template:Use dmy dates Template:Use list-defined references
In computer engineering, Halt and Catch Fire, known by the assembly language mnemonic HCF, is an idiom referring to a computer machine code instruction that causes the computer's central processing unit (CPU) to cease meaningful operation, typically requiring a restart of the computer. It originally referred to a fictitious instruction in IBM System/360 computers (introduced in 1964), making a joke about its numerous non-obvious instruction mnemonics.
With the advent of the MC6800 (introduced in 1974), a design flaw was discovered by programmers. Due to incomplete opcode decoding, two illegal opcodes, 0x9D and 0xDD, will cause the program counter on the processor to increment endlessly, which locks the processor until reset. Those codes have been unofficially named HCF. During the design process of the MC6802, engineers originally planned to remove this instruction, but kept it as-is for testing purposes. As a result, HCF was officially recognized as a real instruction.<ref name="Bryan_2021" /><ref name="Daniels_1985" /> Later, HCF became a humorous catch-all term for instructions that may freeze a processor, including intentional instructions for testing purposes, and unintentional illegal instructions. Some are considered hardware defects, and if the system is shared, a malicious user can execute them to launch a denial-of-service attack.
In the case of real instructions, the implication of this expression is that, whereas in most cases in which a CPU executes an unintended instruction (a bug in the code) the computer may still be able to recover, in the case of an HCF instruction there is, by definition, no way for the system to recover without a restart.
The expression catch fire is a facetious exaggeration of the speed with which the CPU chip would be switching some bus circuits, purportedly causing them to overheat and burn.<ref name="Jargon_2012" />
OriginsEdit
The Z1 (1938) and Z3 (1941) computers built by Konrad Zuse contained illegal sequences of instructions which damaged the hardware if executed by accident.<ref name="Rojas_1997" />
Apocryphal stories connect this term with an illegal opcode in IBM System/360. A processor, upon encountering the instruction, would start switching bus lines very fast, potentially leading to overheating.<ref name="Clements_2006" /><ref name="Kohler_2005" />
In a computer's assembly language, mnemonics are used that are directly equivalent to machine code instructions. The mnemonics are frequently three letters long, such as ADD, CMP (to compare two numbers), and JMP (jump to a different location in the program). The HCF instruction was originally a fictitious assembly language instruction, said to be under development at IBM for use in their System/360 computers, along with many other amusing three-letter acronyms like XPR (Execute Programmer) and CAI (Corrupt Accounting Information), and similar to other joke mnemonics such as "SDI" for "Self Destruct Immediately"<ref name="Dunlap_2016" /> and "CRN" for "Convert to Roman Numerals".<ref name="Cirsovius_2015" /> A list of such mnemonics, including HCF, shows up as "Overextended Mnemonics" in the April 1980 Creative Computing flip-side parody issue.<ref name="CC_1980" />
In modern CPUsEdit
CPU designers sometimes incorporate one or more undocumented machine code instructions for testing purposes, such as the IBM System/360 DIAGnose instruction.<ref name="IBM360_2012" />
Motorola 6800Edit
The Motorola 6800 microprocessor was the first for which an undocumented assembly mnemonic HCF became widely known. The operation codes (opcodes—the portions of the machine language instructions that specify an operation to be performed) hexadecimal 9D and DD were reported and given the unofficial mnemonic HCF in a December 1977 article by Gerry Wheeler in BYTE magazine on undocumented opcodes.<ref name="Wheeler_1977" /> Wheeler noted that Motorola reported 197 valid operation codes for the M6800 processor, and so inferred that with 256 possible 8 bit combinations, there must be 59 invalid instructions. He described the HCF as a "big surprise", and said of the Catch Fire portion of the moniker, "Well, almost":
Another author wrote in 2002:
The 6800's behavior when encountering HCF was known to Motorola by 1976. When the 6800 encounters the HCF instruction, the processor never finds the end of it, endlessly incrementing its program counter until the CPU is reset.<ref name="MC6800_HCF_Explanation">Template:Cite journal</ref> Hence, the address bus effectively becomes a counter, allowing the operation of all address lines to be quickly verified. Once the processor entered this mode, it is not responsive to interrupts, so normal operation can only be restored by a reset (hence the "Drop Dead" and "Halt and Catch Fire" monikers). These references are thus to the unresponsive behavior of the CPU in this state, and not to any form of erratic behavior.Template:Citation needed. Motorola kept the HCF behavior in the 6802 variant of the processor (which released in 1977) as an intentional self-test for the 6802's 128 bytes of onboard RAM.
Other HCF-like instructions were found later on the Motorola 6800 when executing undocumented opcodes FD (cycling twice slower than 9D/DD) or CD/ED (cycling at a human-readable very low frequency on a limited number of high-address lines).<ref name="Demeulemeester_2019" />
HCF is believed to be the first built-in self-test feature on a Motorola microprocessor.<ref name="Daniels_1985" />
Intel x86Edit
The Intel 8086 and subsequent processors in the x86 series have an HLT (halt) instruction, opcode F4, which stops instruction execution and places the processor in a HALT state. An enabled interrupt, a debug exception, the BINIT signal, the INIT signal, or the RESET signal resumes execution, which means the processor can always be restarted.<ref name="Jeschke_2014" /> Some of the early Intel DX4 chips have a problem with the HLT instruction and cannot be restarted after this instruction is used, which disables the computer and turns HLT into more of an HCF instruction. The Linux kernel has a "no-hlt" option telling Linux to run an infinite loop instead of using HLT, which allows users of these broken chips to use Linux.<ref name="Gortmaker_2003" />
The 80286 has the undocumented opcode 0F 04, causing the CPU to hang when executed. The only way out is a CPU reset.Template:Citation needed<ref name="Sandpile_2004" /> In some implementations, the opcode is emulated through BIOS as a halting sequence.<ref name="Sandpile_2003" />
Many computers in the Intel Pentium line can be locked up by executing an invalid instruction (F00F C7C8), which causes the computer to lock up. This became known as the Pentium F00F bug. No compiler creates the instruction, but a malicious programmer can insert it into code to render an afflicted computer inoperable until the machine is power-cycled. Since its discovery, workarounds have been developed to prevent it from locking the computer, and the bug has been eliminated in subsequent Intel processors.<ref name="Collins_1998" /><ref name="Intel_1999" />
During Black Hat USA 2017, Christopher Domas showed that he found a new "Halt and Catch Fire" instruction<ref name="Domas_2017_1" /><ref name="Domas_2017_2" /> on an undisclosed x86 processor model using his own x86 processor fuzzer called sandsifter.<ref name="Domas_2017_3" />
Other CPUsEdit
The NMOS MOS Technology 6502 has 12 invalid instructions which cause the program counter to fail to fetch the next instruction, locking up the CPU and requiring a processor reset.<ref name="Steil_2016" /><ref name="Offenga_2016" /> The WDC version of the CMOS 65C02, as well as the 65C816, has the STP
(stop, opcode $DB
) instruction. When executed, STP
will stop the processor's internal clock, causing all processing to cease—also, the processor will be unresponsive to all inputs except RESB
(reset). The only way to clear the effects of an STP
instruction is to toggle RESB
.
On the Zilog Z80, executing DI (disable interrupts) followed by HALT (wait for an interrupt) results in the CPU staying frozen indefinitely, waiting for an interrupt that cannot happen. However, the non-maskable interrupt signal can be used to break out of this state, making this pair not a true HCF.<ref name="SMS_2016" /><ref name="Flammenkamp_2016" /> The /NMI signal is on Pin 17 of the original 40 pin DIP package.<ref name="Z80_2016" /><ref name="Vis_2016" /> The pair will only result in a HCF condition if either the /NMI pin is connected directly to the +5V rail, making the generation of that signal impossible, or if the interrupt routine that services /NMI ends with a return, placing it back in the HALT state.
The SM83 processorTemplate:Efn<ref name="Gameboy_SM83" /> core in the Game Boy's LR35902 system on chip has a similar issue, triggered by two consecutive HALTs with interrupts disabled.Template:Efn<ref name="Gameboy_2018" /> The core itself contains 11 opcodes that fully lock the CPU when executed.<ref name="Gameboy_2021" />
The Hitachi SC61860, mainly used in Sharp pocket computers in the 1980s and 1990s, has an undocumented HCF instruction with the opcode 7B.<ref name="ESR_2022" />
See alsoEdit
- Cyrix coma bug
- Pentium F00F bug
- Killer poke
- Magic smoke
- lp0 on fire
- Write-only memory (joke)
- NOP (code)