Deutsch   English   Français   Italiano  
<vvgl47$18q46$4@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: olcott <polcott333@gmail.com>
Newsgroups: comp.theory
Subject: Re: Formal systems that cannot possibly be incomplete except for
 unknowns and unknowable
Date: Wed, 7 May 2025 16:59:35 -0500
Organization: A noiseless patient Spider
Lines: 51
Message-ID: <vvgl47$18q46$4@dont-email.me>
References: <vv97ft$3fg66$1@dont-email.me>
 <b47c9e70d415c1e5e469aaab846f0bd05e4bcc51@i2pn2.org>
 <vvall0$o6v5$1@dont-email.me> <vvc33h$25atc$1@dont-email.me>
 <vvcgja$1voc$1@news.muc.de> <vvd6pf$34l9k$1@dont-email.me>
 <vvdads$13pc$1@news.muc.de> <vvdcld$3arjo$1@dont-email.me>
 <vvg6r9$15e69$1@dont-email.me> <vvg7uu$158tp$4@dont-email.me>
 <vvg8tk$15e69$4@dont-email.me> <vvgai8$158tp$6@dont-email.me>
 <vvgcme$15e69$9@dont-email.me> <vvgjdo$18i6e$2@dont-email.me>
 <vvgkao$18q46$1@dont-email.me> <vvgknf$18i5r$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 07 May 2025 23:59:35 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="ee5137430f56269cd3e6381ddf24cf46";
	logging-data="1337478"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX180iGIAWwFxx6DqTy0Hgco1"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:XAnDA4vFOfrik6PaRH3yqaxWunw=
X-Antivirus: Norton (VPS 250507-4, 5/7/2025), Outbound message
In-Reply-To: <vvgknf$18i5r$1@dont-email.me>
Content-Language: en-US
X-Antivirus-Status: Clean
Bytes: 3380

On 5/7/2025 4:52 PM, Richard Heathfield wrote:
> On 07/05/2025 22:46, olcott wrote:
>> On 5/7/2025 4:30 PM, Richard Heathfield wrote:
> 
> <snip>
> 
>>> If the simulation can't reach code that the directly executed program 
>>> reaches, then it's not a faithful simulation.
>>>
>>
>> If is was true that it is not a faithful simulation
>> then you would be able to show exactly what sequence
>> of instructions would be a faithful simulation.
> 
> If it were false, you'd be able to chop out the unreachable code without 
> any adverse effects. Can you?
> 
> <snip>
> 

I already know the answer.
You have not yet shown that you even understand the question.
I suspect that you don't know the first thing about programming.

What exact sequence of the following machine addresses
of DD emulated by HHH causes DD to reach its own
final halt state at machine address [00002155]

When this sequence is required to conform to the
rules of the x86 language?

_DD()
[00002133] 55         push ebp      ; housekeeping
[00002134] 8bec       mov ebp,esp   ; housekeeping
[00002136] 51         push ecx      ; make space for local
[00002137] 6833210000 push 00002133 ; push DD
[0000213c] e882f4ffff call 000015c3 ; call HHH(DD)
[00002141] 83c404     add esp,+04
[00002144] 8945fc     mov [ebp-04],eax
[00002147] 837dfc00   cmp dword [ebp-04],+00
[0000214b] 7402       jz 0000214f
[0000214d] ebfe       jmp 0000214d
[0000214f] 8b45fc     mov eax,[ebp-04]
[00002152] 8be5       mov esp,ebp
[00002154] 5d         pop ebp
[00002155] c3         ret
Size in bytes:(0035) [00002155]

-- 
Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius
hits a target no one else can see." Arthur Schopenhauer