home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   sci.logic      Logic -- math, philosophy & computationa      262,912 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 261,392 of 262,912   
   Ross Finlayson to All   
   Re: Meta: a usenet server just for sci.m   
   27 Nov 25 21:51:20   
   
   [continued from previous message]   
      
   Every device descriptor is hashed at boot – mismatch → refuse to boot.   
   Every thermal/power event is bounded by fixed MSI-X vector – no AML   
   interpretation.   
      
   Thus the only events that can cause RESEAT-WORLD are:   
      
   Admin-signed command (e.g., upgrade kernel image)   
   Catalog hash mismatch (hardware changed)   
   Hibernation image corruption (truck ride went badly)   
      
   All other events are either masked or surfaced as fixed slique entries –   
   no runtime complexity.   
   Consumer vs Server vs Workstation vs NIST Orange Book   
      
   | Profile | Hot-Plug Allowed? | RESEAT Trigger | Use-Case |   
   | -------------------- | ----------------------- |   
   ------------------------ | --------------------------- |   
   | **Consumer PC** | USB hubs, GPU, NVMe | Any plug → RESEAT | Desktop   
   user adds webcam |   
   | **Server Node** | **NONE** (POLICY-0) | Only admin command | 24×7   
   service, no hands |   
   | **Workstation** | USB-Ethernet, display | Admin key required |   
   Engineer adds 10 GbE NIC |   
   | **NIST Orange Book** | **NONE** + signed image | Any hash change →   
   RESEAT | MLS system, hardware sealed |   
      
   Concrete Use-Case Examples (worth locking in?)   
      
   Remote oil-rig node   
   POLICY-2: root HID + USB-Ethernet   
   Link up/down surfaced as fixed vector   
   No hot-plug, no RESEAT – survives 40 °C ambient forever   
   Edge AI box in truck   
   POLICY-3 + hibernation   
   Truck powers off → hibernate image signed & measured   
   On next power-on: cold boot + full re-image (Proximity Map rebuild)   
   Lab workstation   
   POLICY-4 + signed admin key   
   Engineer plugs in USB-C display → RESEAT-WORLD with new invariant   
   Bank vault node   
   POLICY-0 + TPM sealed hibernation   
   Any hardware change → refuse to boot, alarm raised   
      
   Next Decision (waiting for “go”)   
   Pick ONE of the four profiles above (or define your own) and lock:   
      
   Which USB/power events are surfaced as fixed slique entries   
   Which events trigger RESEAT-WORLD   
   Which events are masked forever   
      
   Then we freeze the power-state FSM in TTASL and write the first   
   hibernation-resume template.   
      
      
      
      
      
      
      
      
      
   Thanks Kimi. I'll aver that this is a great amount of good outline, with   
   RF and GG and Grok and Kimi and Claude, then I'll send all these   
   transcripts around, or otherwise re-introduce them when establishing   
   about this operating system design "Deep" or "Critix" (Deep OS). Carry   
   on about general ideas and considered ideas and as about the design, and   
   about the practice of design and design practices.   
      
      
      
      
   Below is a “design-practice charter” for Deep OS (working name   
   “Critix”)   
   — a living checklist you can paste into any future session (GG, Grok,   
   Claude, or me) so we resume exactly at the meta-level instead of   
   re-hashing the spec.   
   Deep OS – Design Practice Charter 2025-11-28 Original Architect: Ross A.   
   Finlayson (RF)   
      
   Design Philosophy (immutable)   
   Correctness → Diagnosability → Performance (in that order)   
   Admin-time invariants only; no runtime surprises   
   P0 = O(1) systolic, P3 = O(N) session, boundary = slique + M-ICC   
   “Generic universal drivers” = freeze seven device rows, mask everything   
   else   
   RESEAT = atomic world-reseating for upgrades/defrag/migration   
   Practice Rituals (every design session)   
   a. Start with concrete cycle budget (e.g., “≤ 400 cycles for NIC RX   
   echo”)   
   b. End with frozen TTASL fragment (two-letter opcodes, cycle count,   
   alignment)   
   c. Every new feature must ship (i) admin-time constant, (ii) trace   
   segment format, (iii) worst-case latency number   
   d. No hand-waving; every “maybe” becomes a mask bit or RESEAT trigger   
   Meta-Design Questions (keep in flight)   
   How small can the first bootable blob be? (target: < 16 KiB)   
   How soon can we prove a property? (cycle-count, memory-footprint,   
   audit-trail)   
   What is the smallest RESEAT that still upgrades the whole node? (pointer   
   swap? hash compare?)   
   When do we stop adding devices? (seven rows is already luxury)   
   Practice Tools (to be created)   
   TTASL linter: rejects any opcode sequence > budget   
   Proximity Map visualiser: auto-generates SVG lattice from ACPI/DTB   
   Cycle-accurate simulator: counts every instruction in template   
   Trace verifier: proves every path ≤ declared cycles   
   RESEAT signer: admin-key + TPM quote + hibernation image hash   
   Design Anti-Patterns (forbidden)   
   “We’ll figure out the constant at runtime” → mask it   
   “One more tiny ACPI method” → ignore it   
   “Maybe we can probe later” → refuse to boot   
   “Let’s make it configurable” → make it invariant   
   Success Criteria (before we ship bytes)   
   One QEMU image boots to login prompt ≤ 1 s   
   One real board (Pi-4 or x86 mini-PC) echoes UDP ≤ 500 cycles   
   One hibernation/resume cycle survives truck ride (hash match)   
   Zero third-party closed-source blobs in the kernel image   
      
   Current Open Design Threads (pick any to continue)   
   A. Micro-RESEAT: can we upgrade only the NVMe driver without touching   
   the rest of the lattice?   
   B. Tiny boot: how many cycles does it take to jump from ROM → TTASL   
   entry point?   
   C. Trace compression: fixed 64 B segment is verbose; can we   
   Huffman-encode the unusual flag only?   
   D. Admin UX: what does the signed invariant bundle look like on disk?   
   (meta-data + TTASL blob + signature)   
   Next concrete deliverable (waiting for “go”)   
      
   Pick one of the four threads above   
   Produce (i) cycle budget, (ii) TTASL fragment, (iii) worst-case latency   
   Or define your own thread and we start typing   
      
   The charter is now public domain – copy/paste into any future session.   
   Whenever you say “go”, we resume exactly at the meta-level and never   
   re-hash the spec.   
      
      
      
      
      
      
      
   Thanks Kimi. It's figured that any re-seat (re-balance, re-organize,   
   re-build) invalidates all the invariants, meaning to re-build new   
   invariants. So, one might establish for each of the state-machines the   
   protocols, of the components/devices, those invariants, then how those   
   relate to constants (numerical constants) that are ID's or handles if   
   those are in-validated, and whether re-issued, making cascade of   
   invariance-breaking, these kinds of things. I.e., it's particular to   
   each device its characteristics and protocol in effect, and the model   
   the "arithmetization" in effect. It's figured that as performance is   
   low-priority, boot-time has the compiling the invariants and making the   
   world, so, it's undefined yet what expectation that would have. About   
   fixed-length segments and with regards to cacheline (that memory   
   coherence is always in cache-lines anyways), and about variable-length   
   codes or compressed-codes, or for example making sparse codes (each   
   coherent alone), these are matters of the organization the sizes and   
   units/atomicity. It's figured that the image can include all the   
   generic/universal drivers, so, then it is just a blob, where it may   
   check itself, as part of "KEST" or "Post-Start Self-Test PSST", that   
   otherwise whether or how it's signed is external. Then, the idea that it   
   is to fit into boot media like the boot sector or boot record, is about   
   the boot-loader and the idea that it may result as a UEFI application or   
   other usual notions of DeviceTree and semantics of BIOS after POST. The   
   idea of "co-operative concurrency" with "fairness and constancy" and   
   "zero trust" together makes for a good idea about then whether two   
   instances would trust each other, and whether they would be willing to   
   trade, or to enter into transactional contexts, with the idea that   
   according to a blind algorithm, they could be swapped, as an example of   
   designing for "correctness, diagnosibility, performance", where   
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca