Sandsifter software finds hidden instructions inside processors.
MRAB
python at mrabarnett.plus.com
Mon Oct 23 19:12:54 EDT 2017
On 2017-10-23 23:50, skybuck2000 at hotmail.com wrote:
> Question:
>
> What do the letters
>
> # v l s c
>
> Stand for in this source code ?
>
> v = not valid/valid
> l = length
> s = ?
> c = ?
>
> If somebody with lots of python experience could dive into this code and then tell me I'd be most gratefull ! :)
>
>
>
> #
> # ./sifter.py --unk --dis --len --sync --tick -- -P1 -t
> # ./injector -P1 -t -t -R -0 -s 4293486582
> #
> # insn tested: 129563
> # artf found: 0
> # runtime: 00:00:04.23
> # seed: 4293486582
> # arch: 64
> # date: 2017-10-22 16:10:51
> #
> # cpu:
> # processor : 0
> # vendor_id : AuthenticAMD
> # cpu family : 15
> # model : 43
> # model name : AMD Athlon(tm) 64 X2 Dual Core Processor 3800+
> # stepping : 1
> # microcode : 0x4d
> # v l s c
> 0f0d00 1 3 5 2 (0f0d0000000000000000000000000000)
> 0f0d01 1 3 5 2 (0f0d0100000000000000000000000000)
> 0f0d02 1 3 5 2 (0f0d0200000000000000000000000000)
> 0f0d03 1 3 5 2 (0f0d0300000000000000000000000000)
> 0f0d0400 1 4 5 2 (0f0d0400000000000000000000000000)
> 0f0d0401 1 4 5 2 (0f0d0401000000000000000000000000)
> 0f0d0402 1 4 5 2 (0f0d0402000000000000000000000000)
> 0f0d0403 1 4 5 2 (0f0d0403000000000000000000000000)
> 0f0d0404 1 4 5 2 (0f0d0404000000000000000000000000)
> 0f0d040500000000 1 8 5 2 (0f0d0405000000000000000000000000)
> 0f0d040501000000 1 8 5 2 (0f0d0405010000000000000000000000)
> 0f0d040502000000 1 8 5 2 (0f0d0405020000000000000000000000)
> 0f0d040503000000 1 8 5 2 (0f0d0405030000000000000000000000)
> 0f0d040504000000 1 8 5 2 (0f0d0405040000000000000000000000)
>
> Bye,
> Skybuck.
>
v = valid
l = length
s = signum
c = sicode
More information about the Python-list
mailing list