Advertisement
Guest User

Untitled

a guest
May 22nd, 2015
196
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.42 KB | None | 0 0
  1. 8001FFF8 NOP
  2. 8001FFFC NOP
  3. 80020000 LUI $16, 0x8002
  4. 80020004 ADDIU $16, $16, 0x30
  5.  
  6. $16 = 0x80020030
  7.  
  8. 80020008 ADDI $17, $00, 0x3
  9. 8002000c SLL $17, $17, 0x2
  10.  
  11. $17 = 12 ( 3 << 2 )
  12.  
  13. 80020010 LW $18, 0x4 ($16)
  14.  
  15. $18 = 0x2 ( load value from 80020034 which disassembled is srl $0,$0,0 -> 0x2 )
  16.  
  17. 80020014 LW $19, 0x0 ($16)
  18.  
  19. $19 = ??? ( value under 0x80020030 not known )
  20.  
  21. 80020018 SW $18, 0x8 ($16)
  22.  
  23. store under 0x80020038 (0x2)
  24.  
  25. 8002001C NOP
  26. 80020020 ADD $18, $18, $17
  27.  
  28. $18 = 0xE ( 0x2 + 12 )
  29.  
  30. 80020024 NOP
  31. 80020028 NOP
  32.  
  33. $18 = 0xE ( nops don't change anything )
  34.  
  35. 8002002C NOP
  36. 80020030 ???
  37. 80020034 SRL $00, $00, 0
  38. 80020038 SRA $00, $00, 0
  39. 8002003C SLLV $00, $00, $00
  40. 80020040 NOP
  41. 80020044 NOP
  42.  
  43. Exception in this code is possible ( I could miss something ):
  44.  
  45. at 80020018 sw instruction, if address if this fragment of memory is write-protected ( segmentation fault )
  46. at 80020030 if executing code continues and execute this address ( illegal instruction )
  47. at 80020010 if this fragment of memory is read-protected (very unlikely) ( segmentation fault )
  48. at 80020000 if this fragment of memory is non-executable ( unlikely ) ( segmentation fault )
  49. if addresses visible in this dump are not these visible by process which executes this code.. - hard to say without knowing environment and how this dump was got.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement