| Deutsch English Français Italiano |
|
<vvgm45$18i6e$4@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: Richard Heathfield <rjh@cpax.org.uk>
Newsgroups: comp.theory
Subject: Re: Formal systems that cannot possibly be incomplete except for
unknowns and unknowable
Date: Wed, 7 May 2025 23:16:37 +0100
Organization: Fix this later
Lines: 50
Message-ID: <vvgm45$18i6e$4@dont-email.me>
References: <vv97ft$3fg66$1@dont-email.me>
<b47c9e70d415c1e5e469aaab846f0bd05e4bcc51@i2pn2.org>
<vvall0$o6v5$1@dont-email.me> <vvc33h$25atc$1@dont-email.me>
<vvcgja$1voc$1@news.muc.de> <vvd6pf$34l9k$1@dont-email.me>
<vvdads$13pc$1@news.muc.de> <vvdcld$3arjo$1@dont-email.me>
<vvg6r9$15e69$1@dont-email.me> <vvg7uu$158tp$4@dont-email.me>
<vvg8tk$15e69$4@dont-email.me> <vvgai8$158tp$6@dont-email.me>
<vvgcme$15e69$9@dont-email.me> <vvgjdo$18i6e$2@dont-email.me>
<vvgkao$18q46$1@dont-email.me> <vvgknf$18i5r$1@dont-email.me>
<vvgl47$18q46$4@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 08 May 2025 00:16:37 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="fc99c878bc8892c2ff7fc287d1c7246a";
logging-data="1329358"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18rlMPfTZ21ZaGKEIIDLNjBTfRbONa4s1p3sScFNtaAJA=="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:vjM8EqxUQw4h3nmFal8n1SK7U90=
In-Reply-To: <vvgl47$18q46$4@dont-email.me>
Content-Language: en-GB
Bytes: 3155
On 07/05/2025 22:59, olcott wrote:
> On 5/7/2025 4:52 PM, Richard Heathfield wrote:
>> On 07/05/2025 22:46, olcott wrote:
>>> On 5/7/2025 4:30 PM, Richard Heathfield wrote:
>>
>> <snip>
>>
>>>> If the simulation can't reach code that the directly executed
>>>> program reaches, then it's not a faithful simulation.
>>>>
>>>
>>> If is was true that it is not a faithful simulation
>>> then you would be able to show exactly what sequence
>>> of instructions would be a faithful simulation.
>>
>> If it were false, you'd be able to chop out the unreachable
>> code without any adverse effects. Can you?
>>
>> <snip>
>>
>
> I already know the answer.
Then you already know why your simulation code fails to simulate
correctly... but of course you /don't/ know, so I'll explain.
Let us postulate a program that contains a function as follows:
void invisible(void)
{
secret();
}
When directly executed, the program calls invisible(), but when
simulated, the invisible() call is unreachable.
secret() could do nothing, or it might launch a for(;;); or it
could catch SIGABRT with a returning handler and call abort().
The simulator has no way of knowing which is which.
Therefore a termination analyser that attempts to analyse this
program but cannot reach all the code is doomed to be unable to
run a correct simulation and is necessarily reduced to guesswork.
--
Richard Heathfield
Email: rjh at cpax dot org dot uk
"Usenet is a strange place" - dmr 29 July 1999
Sig line 4 vacant - apply within