Deutsch English Français Italiano |
<v58m12$8mmo$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Mikko <mikko.levanto@iki.fi> Newsgroups: comp.theory Subject: Re: 195 page execution trace of DDD correctly simulated by HH0 Date: Sun, 23 Jun 2024 11:22:58 +0300 Organization: - Lines: 37 Message-ID: <v58m12$8mmo$1@dont-email.me> References: <v4vrfg$2793f$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Sun, 23 Jun 2024 10:22:59 +0200 (CEST) Injection-Info: dont-email.me; posting-host="63259b0677d409a697f9e23d921f8cd2"; logging-data="285400"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+zItEmwBOxHWIN3C7EgSC5" User-Agent: Unison/2.2 Cancel-Lock: sha1:YhOCSdoG+XERMFcmCGcit6sEPmg= Bytes: 2266 The subject line is not quite correct. The execution trace is not 195 pages long, only 159 pages. In the beginning of the file there is other material, mainly several disaasembled functions, many of which do nothing. Several points in the trace are incorrect. On 2024-06-20 00:00:48 +0000, olcott said: > This shows all of the steps of HH0 simulating DDD > calling a simulated HH0 simulating DDD > > https://liarparadox.org/HH0_(DDD)_Full_Trace.pdf > *Some of the key instructions are color coded* > GREEN---DebugStep Address > RED-----HH Address > YELLOW--All of the DDD instructions > CYAN----Return from DebugStep to Decide_Halting_HH > > _DDD() > [000020a2] 55 push ebp ; housekeeping > [000020a3] 8bec mov ebp,esp ; housekeeping > [000020a5] 68a2200000 push 000020a2 ; push DDD > [000020aa] e8f3f9ffff call 00001aa2 ; call H0 > [000020af] 83c404 add esp,+04 ; housekeeping > [000020b2] 5d pop ebp ; housekeeping > [000020b3] c3 ret ; never gets here > Size in bytes:(0018) [000020b3] That code is not from the mentined trace file. In that file _DDD() is at the addresses 2093..20a4. According to the trace no instruction at the address is executed (because that address points to the last byte of a three byte instruction. -- Mikko