Sandsifter software finds hidden instructions inside processors.
skybuck2000 at hotmail.com
skybuck2000 at hotmail.com
Mon Oct 23 19:41:27 EDT 2017
On Tuesday, October 24, 2017 at 1:13:22 AM UTC+2, MRAB wrote:
> On 2017-10-23 23:50, skybuck2000 at hotmail.com wrote:
> > Question:
> >
> > What do the letters
> >
> > # v l s c
> >
> > Stand for in this source code ?
> >
> > v = not valid/valid
> > l = length
> > s = ?
> > c = ?
> >
> > If somebody with lots of python experience could dive into this code and then tell me I'd be most gratefull ! :)
> >
> >
> >
> > #
> > # ./sifter.py --unk --dis --len --sync --tick -- -P1 -t
> > # ./injector -P1 -t -t -R -0 -s 4293486582
> > #
> > # insn tested: 129563
> > # artf found: 0
> > # runtime: 00:00:04.23
> > # seed: 4293486582
> > # arch: 64
> > # date: 2017-10-22 16:10:51
> > #
> > # cpu:
> > # processor : 0
> > # vendor_id : AuthenticAMD
> > # cpu family : 15
> > # model : 43
> > # model name : AMD Athlon(tm) 64 X2 Dual Core Processor 3800+
> > # stepping : 1
> > # microcode : 0x4d
> > # v l s c
> > 0f0d00 1 3 5 2 (0f0d0000000000000000000000000000)
> > 0f0d01 1 3 5 2 (0f0d0100000000000000000000000000)
> > 0f0d02 1 3 5 2 (0f0d0200000000000000000000000000)
> > 0f0d03 1 3 5 2 (0f0d0300000000000000000000000000)
> > 0f0d0400 1 4 5 2 (0f0d0400000000000000000000000000)
> > 0f0d0401 1 4 5 2 (0f0d0401000000000000000000000000)
> > 0f0d0402 1 4 5 2 (0f0d0402000000000000000000000000)
> > 0f0d0403 1 4 5 2 (0f0d0403000000000000000000000000)
> > 0f0d0404 1 4 5 2 (0f0d0404000000000000000000000000)
> > 0f0d040500000000 1 8 5 2 (0f0d0405000000000000000000000000)
> > 0f0d040501000000 1 8 5 2 (0f0d0405010000000000000000000000)
> > 0f0d040502000000 1 8 5 2 (0f0d0405020000000000000000000000)
> > 0f0d040503000000 1 8 5 2 (0f0d0405030000000000000000000000)
> > 0f0d040504000000 1 8 5 2 (0f0d0405040000000000000000000000)
> >
> > Bye,
> > Skybuck.
> >
>
> v = valid
> l = length
> s = signum
> c = sicode
Thank you, at least signum seems correct, I will investigate sicode later !;)
So far found this tabel describing the meaning for these values:
https://people.cs.pitt.edu/~alanjawi/cs449/code/shell/UnixSignals.htm
Unix Signals
SIGHUP 1 Exit Hangup
SIGINT 2 Exit Interrupt
SIGQUIT 3 Core Quit
SIGILL 4 Core Illegal Instruction
SIGTRAP 5 Core Trace/Breakpoint Trap
SIGABRT 6 Core Abort
SIGEMT 7 Core Emulation Trap
SIGFPE 8 Core Arithmetic Exception
SIGKILL 9 Exit Killed
SIGBUS 10 Core Bus Error
SIGSEGV 11 Core Segmentation Fault
SIGSYS 12 Core Bad System Call
SIGPIPE 13 Exit Broken Pipe
SIGALRM 14 Exit Alarm Clock
SIGTERM 15 Exit Terminated
SIGUSR1 16 Exit User Signal 1
SIGUSR2 17 Exit User Signal 2
SIGCHLD 18 Ignore Child Status
SIGPWR 19 Ignore Power Fail/Restart
SIGWINCH 20 Ignore Window Size Change
SIGURG 21 Ignore Urgent Socket Condition
SIGPOLL 22 Ignore Socket I/O Possible
SIGSTOP 23 Stop Stopped (signal)
SIGTSTP 24 Stop Stopped (user)
SIGCONT 25 Ignore Continued
SIGTTIN 26 Stop Stopped (tty input)
SIGTTOU 27 Stop Stopped (tty output)
SIGVTALRM 28 Exit Virtual Timer Expired
SIGPROF 29 Exit Profiling Timer Expired
SIGXCPU 30 Core CPU time limit exceeded
SIGXFSZ 31 Core File size limit exceeded
SIGWAITING 32 Ignore All LWPs blocked
SIGLWP 33 Ignore Virtual Interprocessor Interrupt for Threads Library
SIGAIO 34 Ignore Asynch
5 is indeed trap I know that much ! ;)
Bye,
Skybuck.
More information about the Python-list
mailing list