请输入您要查询的百科知识:

 

词条 Hexspeak
释义

  1. Notable magic numbers

  2. Alternative letters

  3. PlayStation 3 RSX

  4. See also

  5. References

  6. External links

Hexspeak, like leetspeak, is a novelty form of variant English spelling using the hexadecimal digits. Created by programmers as memorable magic numbers, hexspeak words can serve as a clear and unique identifier with which to mark memory or data.

Hexadecimal notation represents numbers using the 16 digits 0123456789ABCDEF. Using only the letters ABCDEF it is possible to spell several words. Further words can be made by treating some of the decimal numbers as letters - the digit "0" can represent the letter "O", and "1" can represent the letters "I" or "L". Less commonly, "5" can represent "S", "7" represent "T", "12" represent "R" and "6" or "9" can represent "G" or "g", respectively. Numbers such as 2, 4 or 8 can be used in a manner similar to leet or rebuses; e.g. the word "defecate" can be expressed either as DEFECA7E or DEFEC8.

Notable magic numbers

{{details|Magic number (programming)}}

Many computer processors, operating systems, and debuggers make use of magic numbers, especially as a magic debug value.

CodeDecimalDescription
0x0000000FF1CE 1044942 ("office") is used as the last part of product codes (GUID) for Microsoft Office components (visible in registry under HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall registry key).
0x00BAB10C 12235020 ("über (ooba) block") is used as the magic number for the ZFS uberblock.
0x8BADF00D 2343432205 ("ate bad food") is used by Apple in iOS crash reports, when an application takes too long to launch, terminate, or respond to system events.[1]
0x1BADB002 464367618 ("1 bad boot"[2]) Multiboot header magic number.[3]
0x1CEB00DA 485163226 ("ice buddha") was used as the origin for the binary file parser IceBuddha.[4]
0xABADBABE 2880289470 ("a bad babe") was/is used by Microsoft's Windows 7 to trigger a debugger break-point, probably when a USB device is attached[5]
0xB105F00D 2969956365 ("BIOS food") is the value of the low bytes of last four registers on ARM PrimeCell compatible components (the component_id registers), used to identify correct behaviour of a memory-mapped component.
0xB16B00B5 2976579765 ("big boobs") was required by Microsoft's Hyper-V hypervisor to be used by Linux guests as their "guest signature".[6] One proposal suggested changing it to 0x0DEFACED ("defaced").[7] Actually, it was initially changed to decimal and then replaced entirely.[8]
0xBAAAAAAD 3131746989 ("baaaaaad") is used by Apple's iOS exception report to indicate that the log is a stackshot of the entire system, not a crash report.[9]
0xBAADF00D 3131961357 ("bad food") is used by Microsoft's LocalAlloc(LMEM_FIXED) to indicate uninitialised allocated heap memory when the debug heap is used.[10]
0xBAD22222 3134333474 ("bad too repeatedly") is used by Apple's iOS exception log to indicate that a VoIP application has been terminated by iOS because it resumed too frequently.[9]
0xBAADA555 3131942229 date=June 2016}}

0xBADDCAFE 3135097598 ("bad cafe") is used by Libumem to indicate uninitialized memory area.
0xBEEFBABE 3203381950 ("beef babe") is used by Frogger (1997 video game) to detect a stack buffer overflow.
0xC00010FF 3221229823 ("cool off") is used by Apple in iOS crash reports, when application was killed in response to a thermal event.[1]
0xC0DED00D 3235827725 ("code dood") is the PGP Key ID of Chris Drake, Cryptography Programmer and author of the world's most heavily cited patent in computer security[11]
C15C:0D06:F00D 212601099710477 ("cisco dog food") used in the IPv6 address of www.cisco.com on World IPv6 Day. "Dog food" refers to Cisco eating its own dog food with IPv6.
0xCAFEBABE 3405691582 ("cafe babe") is used by Plan 9's libc as a poison value for memory pools.[12] It is also used by Mach-O to identify Universal object files, and by the Java programming language to identify Java bytecode class files. It was originally created by NeXTSTEP developers as a reference to the baristas at Peet's Coffee & Tea.[13]
0xCAFED00D 3405697037 ("cafe dude") is used by Java as a magic number for their pack200 compression.[14]
0xCEFAEDFE 3472551422 ("face feed") is used by Mach-O to identify flat (single architecture) object files. In little endian this reads FEEDFACE, "Feed Face".
0xD15EA5E 219540062 ("disease") is a flag that indicates regular boot on the Nintendo GameCube and Wii consoles.[15][16]
0xDABBAD00 3669732608 ("dabba doo") is the name of a blog on computer security.[17]
0xDEADBAAD 3735927469 ("dead bad") is used by the Android libc abort() function when native heap corruption is detected.
0xDEADBABE 3735927486 ("dead babe") is used by IBM Jikes RVM as a sanity check of the stack of the primary thread.[18]
0xDEADBEAF 3735928495 ("dead beaf") is part of the signature code of Jazz Jackrabbit 2 tileset files.[19] Level files have less room for their signatures and use 0xBABE ("babe") instead.[20] It is also the header of campaign gamesaves used in the Halo Game Series.
deadbeef-dead-beef-dead-beef00000075 ("dead beef") is the GUID assigned to hung/dead virtual machines in Citrix XenServer.
0xDEADBEEF 3735928559 ("dead beef") is frequently used to indicate a software crash or deadlock in embedded systems. 0xDEADBEEF was originally used to mark newly allocated areas of memory that had not yet been initialized—when scanning a memory dump, it is easy to see the 0xDEADBEEF. It is used by IBM RS/6000 systems, Mac OS on 32-bit PowerPC processors and the Commodore Amiga as a magic debug value. On Sun Microsystems' Solaris, it marks freed kernel memory. On OpenVMS running on Alpha processors, 0xDEADBEEF can be seen by pressing CTRL-T. The DEC Alpha SRM console has a background process that traps memory errors, identified by PS as "BeefEater waiting on 0xdeadbeef".[21]
0xDEADC0DE 3735929054 ("dead code") is used as a marker in OpenWrt firmware to signify the beginning of the to-be created jffs2 filesystem at the end of the static firmware.
0xDEADDEAD 3735936685 ("dead dead") is the bug check (STOP) code displayed when invoking a Blue Screen of Death either by telling the kernel via the attached debugger, or by using a special keystroke combination.[22] This is usually seen by driver developers,as it is used to get a memory dump on Windows NT based systems. An alternative to 0xDEADDEAD is the bug check code 0x000000E2,[23] as they are both called MANUALLY_INITIATED_CRASH as seen on the Microsoft Developer Network.
0xDEADD00D 3735932941 ("dead dude") is used by Android in the Dalvik virtual machine to indicate a VM abort.
0xDEADFA11 3735943697 ("dead fall" or "dead fail") is used by Apple in iOS crash reports, when the user force quits an application.[1]
0xDEAD10CC 3735883980 ("dead lock") is used by Apple in iOS crash reports, when application holds on to a system resource while running in the background.[1]
0xDEADFEED 3735944941 ("dead feed") is used by Apple in iOS crash reports, when a timeout occurs spawning a service
0xDEFEC8ED 3741239533 ("defecated") is the magic number for OpenSolaris core dumps.[24]
0xE011CFD0 3759263696 is used as a magic number for Microsoft Office files. In little endian this reads D0CF11E0, "docfile0".[25]
face:b00c 4207849484 ("facebook") used in the IPv6 addresses of www.facebook.com.[26]
0xFACEFEED 4207869677 ("face feed") is used by Alpha servers running Windows NT. The Alpha Hardware Abstraction Layer (HAL) generates this error when it encounters a hardware failure.[27]
0xFBADBEEF 4222467823 ("bad beef") is used in the WebKit and Blink layout engines to indicate a known, unrecoverable error such as out of memory.[28]
0xFEE1DEAD 4276215469 ("feel dead") is used as a magic number in the Linux reboot system call.[29]
0xFEEDBABE 4276992702 ("feed babe") is the magic number used to indicate the beginning of an OpenRG flash partition descriptor.[30]
0xFEEDC0DE 4276994270 ("feed code") is used as filling pattern by the OS-9 Operating System when initializing its RAM.[31]
0xFEEDFACECAFEBEEF 18369614221190020847 ("feed face cafe beef") is the magic number used to send as a password via serial wire to rescue some NXP created controller devices from boot failures.[32][33][34]
0xFFBADD11 4290436369 ("bad DLL"): Used by Windows internally.[35]
0x4B1D 19229 date=June 2015}}
0xB000 0xDEAD 2952847021 date=March 2016}}
0xD0D0CACA 3503344330doo-doo caca") is the uninitialized value of GPIO values on the Nvidia Tegra X1{{citation needed>date=March 2016}}

Alternative letters

Many computer languages require that a hexadecimal number be marked with a prefix or suffix (or both) to identify it as a number. Sometimes the prefix or suffix is used as part of the word.

  • The C programming language uses the "0x" prefix to indicate a hexadecimal number, but the "0x" is usually ignored when reading it as a word. C also allows the suffix L to declare an integer as long, or LL to declare it as long long, making it possible to write "0xDEADCELL" (dead cell). In either case a U may also appear in the suffix to declare the integer as unsigned, making it possible to write "0xFEEDBULL" (feed bull).
  • In the Intel assembly language, hexadecimal numbers are denoted by a "h" suffix, making it possible to write "0beach" (beach). Note that numbers in this notation that begin with a letter must be prefixed with a zero to distinguish them from variable names.
  • Visual Basic uses a &H prefix, for example, "&HEADED" (headed).
  • In Pascal and 6502 assembly language, hexadecimal numbers are denoted by a "$" prefix. This allows for words starting with the letter "S", for example "$EED" (seed).
  • In Б3-34 programmable calculators alternative hexadecimal alphabet was used, where the symbol "−", "L", "C", "Г", "E", " " (space) were used instead of Latin letters. Using these it was possible to display messages like "EГГ0Г" (error).

PlayStation 3 RSX

In reverse engineering aspects of the Sony PlayStation 3, a number of hexspeak codes were found to either trigger, effect or were present in aspects of communicating to and through the PlayStation 3 Hypervisor in communication to its GPU, the RSX Reality Synthesizer.[36]

These projects were largely born out of PS3 homebrew operating on the PS3's OtherOS which allowed Linux to be installed, initially with extremely limited GPU access.

CodeDescription
0x1337beef, 0x1337f001, 0x1337beef Found as part of the RSX Descriptor.
0xf00dbeef The RSX Semaphore Value
0x1337c0d3 and 0x1337babe Begin semaphore value and pad, from the system.[37]

See also

  • Leet
  • file (command)

References

1. ^{{cite web |url=https://developer.apple.com/iphone/library/technotes/tn2008/tn2151.html |title=Technical Note TN2151: Understanding and Analyzing iPhone OS Application Crash Reports |deadurl=yes |archiveurl=https://www.webcitation.org/68qZGxELL?url=https://developer.apple.com/library/ios/ |archivedate=2012-07-02 |df= }}
2. ^{{cite web|url=http://ftp.lyx.org/pub/mach/mach4/multiboot/multiboot-archive|title=Multiboot mailing list archive}}
3. ^{{cite web|url=https://www.gnu.org/software/grub/manual/multiboot/multiboot.html#Header-magic-fields |title=Multiboot specifications}}
4. ^{{cite web|url=http://icebuddha.com |title=IceBuddha.com}}
5. ^{{cite web|url=https://daniel.haxx.se/blog/2011/10/28/whos-0xabadbabe-and-why/ |title=Who’s 0xabadbabe and why?}}
6. ^{{cite web|url=http://www.spinics.net/lists/linux-driver-devel/msg15311.html|title=Staging: hv: vmbus_drv: Move the content of hv.h to hyperv_vmbus.h}}
7. ^{{cite web|url=https://lkml.org/lkml/2012/7/13/261|title=hv: Change the guest ID value}}
8. ^https://github.com/torvalds/linux/commit/83ba0c4f3f317270dae5597d8044b795d119914c
9. ^https://developer.apple.com/library/ios/technotes/tn2151/_index.html
10. ^{{cite web|url=http://www.nobugs.org/developer/win32/debug_crt_heap.html#table|title=Win32 Debug CRT Heap Internals}}
11. ^{{cite web|url=http://www.patentbuddy.com/Patent/6006328 |title=Computer software authentication, protection, and security system |publisher=USPTO |date= |accessdate=2018-07-26}}
12. ^{{cite web| url=https://code.9front.org/hg/plan9front/file/fbd2319ae4be/sys/src/libc/port/pool.c#l126 |title=9front system}}
13. ^{{cite web|url=http://www.artima.com/insidejvm/whyCAFEBABE.html |title=Why Cafebabe |publisher=Artima.com |date= |accessdate=2009-10-01}}
14. ^{{cite web|url=http://download.oracle.com/javase/6/docs/technotes/guides/pack200/pack-spec.html#tocArcHea|title=Pack200: A Packed Class Deployment Format For Java Applications|accessdate=2010-11-03}}
15. ^{{cite web|url=http://hitmen.c02.at/files/yagcd/yagcd/chap4.html#sec4.2.1.1.2|title=Yet Another Gamecube Documentation: Dolphin-OS Globals}}
16. ^{{cite web|url=http://wiibrew.org/wiki/Memory_Map|title=Wiibrew: Memory Map}}
17. ^{{cite web|url=http://0xdabbad00.com |title=0xdabbad00.com}}
18. ^{{cite web |url=http://svn.sourceforge.net/viewvc/jikesrvm/rvmroot/trunk/tools/bootImageRunner/ia32/libvm.c?revision=15664&view=markup: |title=DEADBABE sanity check |date= |accessdate=2009-10-01 }}{{dead link|date=December 2017 |bot=InternetArchiveBot |fix-attempted=yes }}
19. ^{{cite web|title=J2T File Format|url=http://www.jazz2online.com/wiki/index.php?J2T_File_Format}}
20. ^{{cite web|title=J2L File Format|url=http://www.jazz2online.com/wiki/index.php?J2L_File_Format}}
21. ^{{cite web|url=http://www.catb.org/~esr/jargon/html/D/DEADBEEF.html |title=Jargon File entry for DEADBEEF |publisher=Catb.org |date= |accessdate=2009-10-01}}
22. ^{{cite web|url=http://msdn.microsoft.com/en-us/library/ms797162.aspx |title=Bug Check 0xDEADDEAD: MANUALLY_INITIATED_CRASH, MSDN |publisher=msdn.microsoft.com |date=2009-10-01 |accessdate=2009-10-13 |deadurl=yes |archiveurl=https://web.archive.org/web/20091002111240/http://msdn.microsoft.com/en-us/library/ms797162.aspx |archivedate=October 2, 2009 }}
23. ^{{cite web|url=http://msdn.microsoft.com/en-us/library/ms797144.aspx |title=Bug Check 0xE2: MANUALLY_INITIATED_CRASH, MSDN |publisher=msdn.microsoft.com |date=2009-10-01 |accessdate=2009-10-13 |deadurl=yes |archiveurl=https://web.archive.org/web/20090731130050/http://msdn.microsoft.com/en-us/library/ms797144.aspx |archivedate=July 31, 2009 }}
24. ^{{cite web |url=http://src.opensolaris.org/source/xref/onnv/onnv-gate/usr/src/uts/common/sys/dumphdr.h#45 |title=Opensolaris header line 45 for 0xDEFEC8ED |publisher=src.opensolaris.org |date= |accessdate=2011-07-12 |deadurl=yes |archiveurl=https://web.archive.org/web/20110929225516/http://src.opensolaris.org/source/xref/onnv/onnv-gate/usr/src/uts/common/sys/dumphdr.h#45 |archivedate=2011-09-29 |df= }}
25. ^{{cite web|url=http://support.microsoft.com/kb/318326 |title=Documents That Are Supported by the Office Filter}}
26. ^{{Cite news|url=https://www.theregister.co.uk/2015/07/08/facebook_casts_a_hex_on_dns/|title=Facebook casts a hex with self-referential IPv6|access-date=2017-10-21|language=en}}
27. ^{{cite web|url=http://support.microsoft.com/kb/132349 |title=Technet article for 0xFACEFEED |publisher=Support.microsoft.com |date=2006-11-01 |accessdate=2009-10-01}}
28. ^{{cite web|url=https://code.google.com/p/chromium/codesearch#chromium/src/third_party/WebKit/Source/wtf/Assertions.h&l=133 |title=Chromium Assertions.h line 133| accessdate=2014-03-27}}
29. ^{{cite web|url=https://git.kernel.org/cgit/linux/kernel/git/bwh/linux-3.2.y.git/plain/include/linux/reboot.h?id=HEAD|title=include/linux/reboot.h }}
30. ^{{cite web|url=https://lists.openwrt.org/pipermail/openwrt-devel/2013-June/020315.html|title=OpenWrt-Devel: PATCH - add suport for Option GlobeSurfer 3|access-date=2015-12-14|archive-url=https://web.archive.org/web/20160329221818/https://lists.openwrt.org/pipermail/openwrt-devel/2013-June/020315.html|archive-date=2016-03-29|dead-url=yes|df=}}
31. ^{{cite web|url=https://archive.org/stream/os968kOem_v9.9/68k_oem_djvu.txt|title=OS-9 for 68K Processors OEM Installation Manual}}
32. ^{{cite web|url=http://www.nxp.com/files/microcontrollers/doc/app_note/AN4674.pdf|title=NXP Application Note: Qorivva Boot Assist Module Application}}
33. ^{{cite web|url=https://community.nxp.com/thread/334013|title=NXP Community: Censored Device - Password Known}}
34. ^{{cite web|url=https://community.nxp.com/thread/325826|title=NXP Community: RAppID boot loader error}}
35. ^{{Cite web|url=https://www.google.com/#q=0xffbadd11|title=Google search for 0xffbadd11|access-date=15 October 2016}}
36. ^{{cite web|url=http://www.psdevwiki.com/ps3/RSXFIFOCommands |title=RSXFIFOCommands - PS3 Developer Wiki|publisher=psdev wiki|date=2014-05-20|accessdate=2017-11-01}}
37. ^{{cite web|url=https://github.com/RPCS3/rpcs3/blob/master/rpcs3/Emu/Cell/lv2/sys_rsx.cpp |title=rpc3/sys_rsx.cpp|publisher=RPCS3 on github|date=2017-10-28|accessdate=2017-11-01}}

External links

  • List of real 3 to 7 hex character English words
  • BADA55.io - CSS hex color words for web developers
  • {{cite web |url = https://www.paulirish.com/2009/memorable-hex-colors/ |title = Memorable Hex Colors |author = Paul Irish |date = 4 December 2009}}

4 : Source code|Obfuscation|Computer humor|Hexadecimal numeral system

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/14 12:47:22