| Deutsch English Français Italiano |
|
<v4a0dr$157ic$2@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: olcott <polcott333@gmail.com>
Newsgroups: comp.theory,sci.logic
Subject: Re: D correctly simulated by H proved for THREE YEARS --- rewritten
Date: Tue, 11 Jun 2024 12:10:19 -0500
Organization: A noiseless patient Spider
Lines: 140
Message-ID: <v4a0dr$157ic$2@dont-email.me>
References: <v45tec$4q15$1@dont-email.me> <v46drt$3i580$1@i2pn2.org>
<v46ipg$bqg4$1@dont-email.me> <v476c3$ggn5$12@dont-email.me>
<v493ml$vlup$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 11 Jun 2024 19:10:20 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="7511da41317e1c66c22f772cd659795f";
logging-data="1220172"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/JF5wfJA6Wxipz8+akY5lN"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:GzFz2GbSZ1Hny57LZT065W2XuRA=
Content-Language: en-US
In-Reply-To: <v493ml$vlup$1@dont-email.me>
Bytes: 7670
On 6/11/2024 4:00 AM, Mikko wrote:
> On 2024-06-10 15:33:23 +0000, olcott said:
>
>> On 6/10/2024 4:59 AM, Mikko wrote:
>>> On 2024-06-10 08:35:09 +0000, joes said:
>>>
>>>> Am Sun, 09 Jun 2024 22:54:52 -0500 schrieb olcott:
>>>>> On 5/29/2021 2:26 PM, olcott wrote:
>>>>> https://groups.google.com/g/comp.theory/c/dTvIY5NX6b4/m/cHR2ZPgPBAAJ
>>>>>
>>>>> THE ONLY POSSIBLE WAY for D simulated by H to have the same
>>>>> behavior as
>>>>> the directly executed D(D) is for the instructions of D to be
>>>>> incorrectly simulated by H (details provided below).
>>>>>
>>>>> _D()
>>>>> [00000cfc](01) 55 push ebp
>>>>> [00000cfd](02) 8bec mov ebp,esp
>>>>> [00000cff](03) 8b4508 mov eax,[ebp+08]
>>>>> [00000d02](01) 50 push eax ; push D
>>>>> [00000d03](03) 8b4d08 mov ecx,[ebp+08]
>>>>> [00000d06](01) 51 push ecx ; push D
>>>>> [00000d07](05) e800feffff call 00000b0c ; call H
>>>>> [00000d0c](03) 83c408 add esp,+08
>>>>> [00000d0f](02) 85c0 test eax,eax
>>>>> [00000d11](02) 7404 jz 00000d17
>>>>> [00000d13](02) 33c0 xor eax,eax
>>>>> [00000d15](02) eb05 jmp 00000d1c
>>>>> [00000d17](05) b801000000 mov eax,00000001
>>>>> [00000d1c](01) 5d pop ebp
>>>>> [00000d1d](01) c3 ret Size in
>>>>> bytes:(0034) [00000d1d]
>>>>>
>>>>> In order for D simulated by H to have the same behavior as the
>>>>> directly
>>>>> executed D(D) H must ignore the instruction at machine address
>>>>> [00000d07]. *That is an incorrect simulation of D*
>>>> I don't understand. Does D(D) ignore the call to H(D,D)?
>>>>
>>>>> H does not ignore that instruction and simulates itself simulating D.
>>>>> The simulated H outputs its own execution trace of D.
>>>
>>> What instructions does H use to output that trace and how those
>>
>> I don't remember it has been two years.
>> I am looking into this again.
>>
>>> instructions are simulated when H is simulated?
>>>
>>
>> They are simulated by
>> u32 DebugStep(Registers* master_state,
>> Registers* slave_state, Decoded_Line_Of_Code* decoded)
>> { return 0; }
>>
>> This depends on libx86emu.
>>
>>> And why does H output any traces? That is not required by its
>>
>> The traces are output so that people can directly see the
>> same infinite recursion behavior pattern that H sees and
>> thus know that H really is required to abort ts simulation.
>
> Looks like they don't serve that purpose. Perhaps you should
> change something.
*No one has verified the actual facts of this for THREE YEARS*
*No one has verified the actual facts of this for THREE YEARS*
*No one has verified the actual facts of this for THREE YEARS*
On 5/29/2021 2:26 PM, olcott wrote:
https://groups.google.com/g/comp.theory/c/dTvIY5NX6b4/m/cHR2ZPgPBAAJ
_D()
[00000cfc](01) 55 push ebp
[00000cfd](02) 8bec mov ebp,esp
[00000cff](03) 8b4508 mov eax,[ebp+08]
[00000d02](01) 50 push eax ; push D
[00000d03](03) 8b4d08 mov ecx,[ebp+08]
[00000d06](01) 51 push ecx ; push D
[00000d07](05) e800feffff call 00000b0c ; call H
[00000d0c](03) 83c408 add esp,+08
[00000d0f](02) 85c0 test eax,eax
[00000d11](02) 7404 jz 00000d17
[00000d13](02) 33c0 xor eax,eax
[00000d15](02) eb05 jmp 00000d1c
[00000d17](05) b801000000 mov eax,00000001
[00000d1c](01) 5d pop ebp
[00000d1d](01) c3 ret
Size in bytes:(0034) [00000d1d]
It is impossible for D correctly simulated by H to ever reach
its simulated final state at its own machine address [00000d1d].
People disagree with this by changing the subject to D not simulated
by H as all. They have been indoctrinated into believing that this
strawman deception is correct yet
cannot possibly show the detailed steps of how D correctly simulated
by H can possibly reach its own simulated machine address of [00000d1d].
*Here are the steps that prove that I am correct*
(1) Executed H simulates the first seven instructions of D.
(2) Simulated D calls simulated H(D,D) to simulate itself again.
(3) Simulated H simulates the first seven instructions of simulated
simulated D.
(4) Simulated simulated D simulated by simulated H calls
simulated simulated H(D,D) to simulate itself again.
*HERE ARE ALL OF CONCRETE DETAILS OF THAT*
*Begin Local Halt Decider Simulation at Machine Address:cfc*
[00000cfc][00211839][0021183d](01) 55 push ebp ; begin D
[00000cfd][00211839][0021183d](02) 8bec mov ebp,esp
[00000cff][00211839][0021183d](03) 8b4508 mov eax,[ebp+08]
[00000d02][00211835][00000cfc](01) 50 push eax ; push D
[00000d03][00211835][00000cfc](03) 8b4d08 mov ecx,[ebp+08]
[00000d06][00211831][00000cfc](01) 51 push ecx ; push D
[00000d07][0021182d][00000d0c](05) e800feffff call 00000b0c ; call H
*This call to H is simulated by directly executed H*
machine stack stack machine assembly
address address data code language
======== ======== ======== =============== =============
[00000cfc][0025c261][0025c265](01) 55 push ebp ; begin D
[00000cfd][0025c261][0025c265](02) 8bec mov ebp,esp
[00000cff][0025c261][0025c265](03) 8b4508 mov eax,[ebp+08]
[00000d02][0025c25d][00000cfc](01) 50 push eax ; push D
[00000d03][0025c25d][00000cfc](03) 8b4d08 mov ecx,[ebp+08]
[00000d06][0025c259][00000cfc](01) 51 push ecx ; push D
[00000d07][0025c255][00000d0c](05) e800feffff call 00000b0c ; call H
*This call to H would be simulated by simulated executed H*
*Infinitely Nested Simulation Detected Simulation Stopped*
--
Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius
hits a target no one else can see." Arthur Schopenhauer