Deutsch English Français Italiano |
<v4pc7t$ln46$3@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: olcott <polcott333@gmail.com> Newsgroups: comp.theory Subject: Re: H(D,D) cannot even be asked about the behavior of D(D) V3 ---IGNORING ALL OTHER REPLIES Date: Mon, 17 Jun 2024 08:03:56 -0500 Organization: A noiseless patient Spider Lines: 81 Message-ID: <v4pc7t$ln46$3@dont-email.me> References: <v4kf3h$3h3iu$7@dont-email.me> <v4m5l6$3v4ql$1@dont-email.me> <v4mmsd$1qt6$3@dont-email.me> <v4oo36$hnns$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Mon, 17 Jun 2024 15:03:57 +0200 (CEST) Injection-Info: dont-email.me; posting-host="24f2a1964fe8769a85c52084edf5324e"; logging-data="711814"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/vHhGZLomEdtf2YHE4ll1q" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:U5ysZqYw+uIFtvvlh+2Lxr1lrUs= In-Reply-To: <v4oo36$hnns$1@dont-email.me> Content-Language: en-US Bytes: 4116 On 6/17/2024 2:20 AM, Mikko wrote: > On 2024-06-16 12:47:09 +0000, olcott said: > >> On 6/16/2024 2:53 AM, Mikko wrote: >>> On 2024-06-15 16:22:09 +0000, olcott said: >>> >>>> On 6/13/2024 8:24 PM, Richard Damon wrote: >>>> > On 6/13/24 11:32 AM, olcott wrote: >>>> >> >>>> >> It is contingent upon you to show the exact steps of how H computes >>>> >> the mapping from the x86 machine language finite string input to >>>> >> H(D,D) using the finite string transformation rules specified by >>>> >> the semantics of the x86 programming language that reaches the >>>> >> behavior of the directly executed D(D) >>>> >> >>>> > >>>> > Why? I don't claim it can. >>>> >>>> The first six steps of this mapping are when instructions >>>> at the machine address range of [00000cfc] to [00000d06] >>>> are simulated/executed. >>>> >>>> After that the behavior of D correctly simulated by H diverges >>>> from the behavior of D(D) because the call to H(D,D) by D >>>> correctly simulated by H cannot possibly return to D. >>>> >>>> _D() >>>> [00000cfc](01) 55 push ebp >>>> [00000cfd](02) 8bec mov ebp,esp >>>> [00000cff](03) 8b4508 mov eax,[ebp+08] >>>> [00000d02](01) 50 push eax ; push D >>>> [00000d03](03) 8b4d08 mov ecx,[ebp+08] >>>> [00000d06](01) 51 push ecx ; push D >>>> [00000d07](05) e800feffff call 00000b0c ; call H >>>> [00000d0c](03) 83c408 add esp,+08 >>>> [00000d0f](02) 85c0 test eax,eax >>>> [00000d11](02) 7404 jz 00000d17 >>>> [00000d13](02) 33c0 xor eax,eax >>>> [00000d15](02) eb05 jmp 00000d1c >>>> [00000d17](05) b801000000 mov eax,00000001 >>>> [00000d1c](01) 5d pop ebp >>>> [00000d1d](01) c3 ret >>>> Size in bytes:(0034) [00000d1d] >>> >>> When you put "V2" or "V3" or something similar on the subject line >>> you should tell what is different from the original version. >>> >> >> I ask what are the steps >> I provide 6 steps and then ask what are the next steps. >> I provide all of the steps. > > In which version? > *This is the simplest possible version* void DDD() { H0(DDD); } After six steps of DDD are correctly emulated by H0 what machine address of DDD would it be at? _DDD() [00001fd2] 55 push ebp ; housekeeping [00001fd3] 8bec mov ebp,esp ; housekeeping [00001fd5] 68d21f0000 push 00001fd2 ; push DDD [00001fda] e8f3f9ffff call 000019d2 ; call H0 [00001fdf] 83c404 add esp,+04 ; housekeeping [00001fe2] 5d pop ebp ; housekeeping [00001fe3] c3 ret ; return to caller Size in bytes:(0018) [00001fe3] -- Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius hits a target no one else can see." Arthur Schopenhauer