Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 16 Sep 2013 14:20:00 -0400
From: Yaniv Sapir <>
To: john-dev <>
Subject: Re: bcrypt-parallella on 64-core (was: Katja's weekly
 report #13)

BTW, the restriction is not just with fetch, but with load in general. The
only safe method for a core on this row to read data from ERAM is using
eDMA. Writing to ERAM, or writing data from host (or external space in
general) onto these cores is no problem.

On Mon, Sep 16, 2013 at 1:38 PM, Yaniv Sapir <> wrote:

> Katja,
> As for the empty buffers - the E64 chip has a design bug - cores at the
> 3rd row cannot fetch instructions from external memory. Due to this, the
> kernel programs loaded on these cores are not run, because portions of the
> code reside in ERAM (b/c we use prtintf() calls). I believe that in your
> program, you use the internal.ldf profile, so this is not a problem.
> As for the other problem, I will have a look at your code later to see
> why. can you post the path to the program on the Z64 board?
> Yaniv.

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.