# HG changeset patch # User HackBot # Date 1366649121 0 # Node ID 7168d507d1f44e11e54598443e8d7250edde2842 # Parent 66c8d802a9ca17b3e8489e363daf9329be718f93 echo \'main() { asm("xor %edi, %edi\\n" "inc %edi\\n" "mov %rsp, %rsi\\n" "go: movl $0xb195e2, (%rsi)\\n" "rdtsc\\n" "and $1, %al\\n" "add %al, 2(%rsi)\\n" "mov %edi, %eax\\n" "xor %edx, %edx\\n" "mov $3, %dl\\n" "syscall\\n" "jmp go"); }\' > maze.c && gcc maze.c -o maze && ./maze diff -r 66c8d802a9ca -r 7168d507d1f4 maze Binary file maze has changed diff -r 66c8d802a9ca -r 7168d507d1f4 maze.c --- a/maze.c Mon Apr 22 16:12:47 2013 +0000 +++ b/maze.c Mon Apr 22 16:45:21 2013 +0000 @@ -1,1 +1,1 @@ -unsigned long const main[] = {0x8948c7ff48ff3148, 0x0f0080b7e406c7e6, 0x2468880043f2431, 0x50ff8894803b299, 0xedeb}; +main() { asm("xor %edi, %edi\n" "inc %edi\n" "mov %rsp, %rsi\n" "go: movl $0xb195e2, (%rsi)\n" "rdtsc\n" "and $1, %al\n" "add %al, 2(%rsi)\n" "mov %edi, %eax\n" "xor %edx, %edx\n" "mov $3, %dl\n" "syscall\n" "jmp go"); }