| Deutsch English Français Italiano |
|
<vvgl47$18q46$4@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: olcott <polcott333@gmail.com> Newsgroups: comp.theory Subject: Re: Formal systems that cannot possibly be incomplete except for unknowns and unknowable Date: Wed, 7 May 2025 16:59:35 -0500 Organization: A noiseless patient Spider Lines: 51 Message-ID: <vvgl47$18q46$4@dont-email.me> References: <vv97ft$3fg66$1@dont-email.me> <b47c9e70d415c1e5e469aaab846f0bd05e4bcc51@i2pn2.org> <vvall0$o6v5$1@dont-email.me> <vvc33h$25atc$1@dont-email.me> <vvcgja$1voc$1@news.muc.de> <vvd6pf$34l9k$1@dont-email.me> <vvdads$13pc$1@news.muc.de> <vvdcld$3arjo$1@dont-email.me> <vvg6r9$15e69$1@dont-email.me> <vvg7uu$158tp$4@dont-email.me> <vvg8tk$15e69$4@dont-email.me> <vvgai8$158tp$6@dont-email.me> <vvgcme$15e69$9@dont-email.me> <vvgjdo$18i6e$2@dont-email.me> <vvgkao$18q46$1@dont-email.me> <vvgknf$18i5r$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Wed, 07 May 2025 23:59:35 +0200 (CEST) Injection-Info: dont-email.me; posting-host="ee5137430f56269cd3e6381ddf24cf46"; logging-data="1337478"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX180iGIAWwFxx6DqTy0Hgco1" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:XAnDA4vFOfrik6PaRH3yqaxWunw= X-Antivirus: Norton (VPS 250507-4, 5/7/2025), Outbound message In-Reply-To: <vvgknf$18i5r$1@dont-email.me> Content-Language: en-US X-Antivirus-Status: Clean Bytes: 3380 On 5/7/2025 4:52 PM, Richard Heathfield wrote: > On 07/05/2025 22:46, olcott wrote: >> On 5/7/2025 4:30 PM, Richard Heathfield wrote: > > <snip> > >>> If the simulation can't reach code that the directly executed program >>> reaches, then it's not a faithful simulation. >>> >> >> If is was true that it is not a faithful simulation >> then you would be able to show exactly what sequence >> of instructions would be a faithful simulation. > > If it were false, you'd be able to chop out the unreachable code without > any adverse effects. Can you? > > <snip> > I already know the answer. You have not yet shown that you even understand the question. I suspect that you don't know the first thing about programming. What exact sequence of the following machine addresses of DD emulated by HHH causes DD to reach its own final halt state at machine address [00002155] When this sequence is required to conform to the rules of the x86 language? _DD() [00002133] 55 push ebp ; housekeeping [00002134] 8bec mov ebp,esp ; housekeeping [00002136] 51 push ecx ; make space for local [00002137] 6833210000 push 00002133 ; push DD [0000213c] e882f4ffff call 000015c3 ; call HHH(DD) [00002141] 83c404 add esp,+04 [00002144] 8945fc mov [ebp-04],eax [00002147] 837dfc00 cmp dword [ebp-04],+00 [0000214b] 7402 jz 0000214f [0000214d] ebfe jmp 0000214d [0000214f] 8b45fc mov eax,[ebp-04] [00002152] 8be5 mov esp,ebp [00002154] 5d pop ebp [00002155] c3 ret Size in bytes:(0035) [00002155] -- Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius hits a target no one else can see." Arthur Schopenhauer