| Deutsch English Français Italiano |
|
<v5ikch$2i32s$3@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!feed.opticnetworks.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: olcott <polcott333@gmail.com> Newsgroups: comp.theory,sci.logic Subject: Re: DDD correctly emulated by H0 -- Ben agrees that Sipser approved criteria is met Date: Wed, 26 Jun 2024 21:56:17 -0500 Organization: A noiseless patient Spider Lines: 113 Message-ID: <v5ikch$2i32s$3@dont-email.me> References: <v45tec$4q15$1@dont-email.me> <v51ge4$2kbbe$2@dont-email.me> <v539bk$329sv$1@dont-email.me> <v53upb$35vak$6@dont-email.me> <v575pl$3sg5p$1@dont-email.me> <v5767s$3soh6$1@dont-email.me> <v5e28t$11urb$5@i2pn2.org> <v5eg03$1ikpr$2@dont-email.me> <v5eho7$24l4$1@news.muc.de> <87jzidm83f.fsf@bsb.me.uk> <v5el8c$24l4$4@news.muc.de> <v5evoi$1lgoi$1@dont-email.me> <v5frvn$14bcm$6@i2pn2.org> <v5ft1p$1uc3o$2@dont-email.me> <v5fu24$14bcn$2@i2pn2.org> <v5fuf7$1up2o$1@dont-email.me> <v5fvvk$14bcn$4@i2pn2.org> <v5g1ue$1v8bm$2@dont-email.me> <v5g29u$14bcm$11@i2pn2.org> <v5g2nd$1v8bm$4@dont-email.me> <v5gsfv$15l89$2@i2pn2.org> <v5h5sd$24jbd$10@dont-email.me> <v5i8v9$17ej1$2@i2pn2.org> <v5i998$2cko8$1@dont-email.me> <v5i9ot$17ej0$3@i2pn2.org> <v5ib7n$2cko8$4@dont-email.me> <v5ichc$17ej1$8@i2pn2.org> <5nSdnSkMN76jIOH7nZ2dnZfqnPidnZ2d@brightview.co.uk> <yumdnWJaTZk7XeH7nZ2dnZfqn_WdnZ2d@brightview.co.uk> <v5igku$17ej0$5@i2pn2.org> <v5iht1$2hkk4$4@dont-email.me> <v5ijd6$17ej1$12@i2pn2.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Thu, 27 Jun 2024 04:56:18 +0200 (CEST) Injection-Info: dont-email.me; posting-host="d7b6b7ddfe8775f34f568700240d9d1b"; logging-data="2690140"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+xczKXr0NxyH252uy15l4y" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:efE4aDv63/Zc9IX64saHGeucqPk= In-Reply-To: <v5ijd6$17ej1$12@i2pn2.org> Content-Language: en-US Bytes: 6249 On 6/26/2024 9:39 PM, Richard Damon wrote: > On 6/26/24 10:13 PM, olcott wrote: >> On 6/26/2024 8:52 PM, Richard Damon wrote: >>> On 6/26/24 9:30 PM, Mike Terry wrote: >>>> On 27/06/2024 02:15, Mike Terry wrote: >>>>> On 27/06/2024 01:42, Richard Damon wrote: >>>>>> On 6/26/24 8:20 PM, olcott wrote: >>>>>>> On 6/26/2024 6:55 PM, Richard Damon wrote: >>>>>>>> On 6/26/24 7:46 PM, olcott wrote: >>>>>>>>> On 6/26/2024 6:41 PM, Richard Damon wrote: >>>>>>>>>> On 6/26/24 9:42 AM, olcott wrote: >>>>>>>>>>> On 6/26/2024 6:02 AM, Richard Damon wrote: >>>>>>>>>>>> On 6/25/24 11:42 PM, olcott wrote: >>>>>>>>>>>>> >>>>>>>>>>>>> That is not the way that it actually works. >>>>>>>>>>>>> That the the way that lies are defined. >>>>>>>>>>>> >>>>>>>>>>>> Source for you claim? >>>>>>>>>>>> >>>>>>>>>>>> Where is you finite set of steps from the truthmakers of the >>>>>>>>>>>> system to that claim? >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> _DDD() >>>>>>>>>>> [00002172] 55 push ebp ; housekeeping >>>>>>>>>>> [00002173] 8bec mov ebp,esp ; housekeeping >>>>>>>>>>> [00002175] 6872210000 push 00002172 ; push DDD >>>>>>>>>>> [0000217a] e853f4ffff call 000015d2 ; call H0(DDD) >>>>>>>>>>> [0000217f] 83c404 add esp,+04 >>>>>>>>>>> [00002182] 5d pop ebp >>>>>>>>>>> [00002183] c3 ret >>>>>>>>>>> Size in bytes:(0018) [00002183] >>>>>>>>>>> >>>>>>>>>>> The call from DDD to H0(DDD) when DDD is correctly emulated >>>>>>>>>>> by H0 cannot possibly return. >>>>>>>>>> >>>>>>>>>> Sure it can. I have shown an H0 that does so. >>>>>>>>>> >>>>>>>>> >>>>>>>>> I already told you that example does not count. >>>>>>>>> >>>>>>>>> I can't keep repeating those details or others >>>>>>>>> that so far have no idea what an x86 emulator is >>>>>>>>> will be baffled beyond all hope of comprehension. >>>>>>>>> >>>>>>>> >>>>>>>> WHy not? >>>>>>>> >>>>>>> >>>>>>> We have already been over that you know that you cheated. >>>>>>> >>>>>> >>>>>> Nope, since you didn't put in the rule, and if you had it would >>>>>> have shown that you lied, as if H0 is a pure function then the >>>>>> call to H0 emulated by H0 needs to have the same behaivor as the >>>>>> direct call to H0 by main. >>>>> >>>>> Incidentally, the nonconformance you're referring to is shown >>>>> explicitly in the "195 page trace" that PO linked to. [I.e. the >>>>> simulated H does not correctly track the code path of the outer H.] >>>> >>>> I suppose I should have made clear, that's not simply due to the >>>> simulated H being aborted. There is an instruction in H: [actually, >>>> in Init_Halts_HH()] >>>> >>>> [000012e4] 753b jnz 00001321 >>>> >>>> and in outer H control proceeds to 000012e6 [i.e. branch not taken], >>>> whilein simulated H control proceeds to 00001321 [i.e. branch taken] >>>> >>>> >>>> Mike. >>>> >>> >>> Would need to look closer at the code, but I bet that the simulated >>> machine is looking into the trace buffer to see if it is simulated or >>> not. >>> >>> In effect, it is misusing static memory just like he says isn't allowed. >>> >>> >> >> The slaves to a UTM either use a portion of the UTMs tape >> or they can't possibly exist. There is probably a more pure >> way to encode this. >> > > Nope, they use virtual memory provided by the UTM. > That *is* what it *is* doing. The UTM gets this from x86utm. The slaves use the already allocated memory. > They write to what they consider to be their tape, and the UTM figures > out how to store that on its tape to be able to give it back when > requested. > That is already what it does. > Of course, you never understood the need for putting the simulated > machine in its own virtual memory space. I have been doing that for 3.5 years. It has its own stack registers and RAM. The machine code is the same code, yet executed as a separate process. -- Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius hits a target no one else can see." Arthur Schopenhauer