Forums before death by AOL, social media and spammers... "We can't have nice things"
|    sci.logic    |    Logic -- math, philosophy & computationa    |    262,912 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 261,392 of 262,912    |
|    Ross Finlayson to All    |
|    Re: Meta: a usenet server just for sci.m    |
|    27 Nov 25 21:51:20    |
      [continued from previous message]              Every device descriptor is hashed at boot – mismatch → refuse to boot.       Every thermal/power event is bounded by fixed MSI-X vector – no AML       interpretation.              Thus the only events that can cause RESEAT-WORLD are:              Admin-signed command (e.g., upgrade kernel image)       Catalog hash mismatch (hardware changed)       Hibernation image corruption (truck ride went badly)              All other events are either masked or surfaced as fixed slique entries –       no runtime complexity.       Consumer vs Server vs Workstation vs NIST Orange Book              | Profile | Hot-Plug Allowed? | RESEAT Trigger | Use-Case |       | -------------------- | ----------------------- |       ------------------------ | --------------------------- |       | **Consumer PC** | USB hubs, GPU, NVMe | Any plug → RESEAT | Desktop       user adds webcam |       | **Server Node** | **NONE** (POLICY-0) | Only admin command | 24×7       service, no hands |       | **Workstation** | USB-Ethernet, display | Admin key required |       Engineer adds 10 GbE NIC |       | **NIST Orange Book** | **NONE** + signed image | Any hash change →       RESEAT | MLS system, hardware sealed |              Concrete Use-Case Examples (worth locking in?)              Remote oil-rig node       POLICY-2: root HID + USB-Ethernet       Link up/down surfaced as fixed vector       No hot-plug, no RESEAT – survives 40 °C ambient forever       Edge AI box in truck       POLICY-3 + hibernation       Truck powers off → hibernate image signed & measured       On next power-on: cold boot + full re-image (Proximity Map rebuild)       Lab workstation       POLICY-4 + signed admin key       Engineer plugs in USB-C display → RESEAT-WORLD with new invariant       Bank vault node       POLICY-0 + TPM sealed hibernation       Any hardware change → refuse to boot, alarm raised              Next Decision (waiting for “go”)       Pick ONE of the four profiles above (or define your own) and lock:              Which USB/power events are surfaced as fixed slique entries       Which events trigger RESEAT-WORLD       Which events are masked forever              Then we freeze the power-state FSM in TTASL and write the first       hibernation-resume template.                                                                      Thanks Kimi. I'll aver that this is a great amount of good outline, with       RF and GG and Grok and Kimi and Claude, then I'll send all these       transcripts around, or otherwise re-introduce them when establishing       about this operating system design "Deep" or "Critix" (Deep OS). Carry       on about general ideas and considered ideas and as about the design, and       about the practice of design and design practices.                                   Below is a “design-practice charter” for Deep OS (working name       “Critix”)       — a living checklist you can paste into any future session (GG, Grok,       Claude, or me) so we resume exactly at the meta-level instead of       re-hashing the spec.       Deep OS – Design Practice Charter 2025-11-28 Original Architect: Ross A.       Finlayson (RF)              Design Philosophy (immutable)       Correctness → Diagnosability → Performance (in that order)       Admin-time invariants only; no runtime surprises       P0 = O(1) systolic, P3 = O(N) session, boundary = slique + M-ICC       “Generic universal drivers” = freeze seven device rows, mask everything       else       RESEAT = atomic world-reseating for upgrades/defrag/migration       Practice Rituals (every design session)       a. Start with concrete cycle budget (e.g., “≤ 400 cycles for NIC RX       echo”)       b. End with frozen TTASL fragment (two-letter opcodes, cycle count,       alignment)       c. Every new feature must ship (i) admin-time constant, (ii) trace       segment format, (iii) worst-case latency number       d. No hand-waving; every “maybe” becomes a mask bit or RESEAT trigger       Meta-Design Questions (keep in flight)       How small can the first bootable blob be? (target: < 16 KiB)       How soon can we prove a property? (cycle-count, memory-footprint,       audit-trail)       What is the smallest RESEAT that still upgrades the whole node? (pointer       swap? hash compare?)       When do we stop adding devices? (seven rows is already luxury)       Practice Tools (to be created)       TTASL linter: rejects any opcode sequence > budget       Proximity Map visualiser: auto-generates SVG lattice from ACPI/DTB       Cycle-accurate simulator: counts every instruction in template       Trace verifier: proves every path ≤ declared cycles       RESEAT signer: admin-key + TPM quote + hibernation image hash       Design Anti-Patterns (forbidden)       “We’ll figure out the constant at runtime” → mask it       “One more tiny ACPI method” → ignore it       “Maybe we can probe later” → refuse to boot       “Let’s make it configurable” → make it invariant       Success Criteria (before we ship bytes)       One QEMU image boots to login prompt ≤ 1 s       One real board (Pi-4 or x86 mini-PC) echoes UDP ≤ 500 cycles       One hibernation/resume cycle survives truck ride (hash match)       Zero third-party closed-source blobs in the kernel image              Current Open Design Threads (pick any to continue)       A. Micro-RESEAT: can we upgrade only the NVMe driver without touching       the rest of the lattice?       B. Tiny boot: how many cycles does it take to jump from ROM → TTASL       entry point?       C. Trace compression: fixed 64 B segment is verbose; can we       Huffman-encode the unusual flag only?       D. Admin UX: what does the signed invariant bundle look like on disk?       (meta-data + TTASL blob + signature)       Next concrete deliverable (waiting for “go”)              Pick one of the four threads above       Produce (i) cycle budget, (ii) TTASL fragment, (iii) worst-case latency       Or define your own thread and we start typing              The charter is now public domain – copy/paste into any future session.       Whenever you say “go”, we resume exactly at the meta-level and never       re-hash the spec.                                                        Thanks Kimi. It's figured that any re-seat (re-balance, re-organize,       re-build) invalidates all the invariants, meaning to re-build new       invariants. So, one might establish for each of the state-machines the       protocols, of the components/devices, those invariants, then how those       relate to constants (numerical constants) that are ID's or handles if       those are in-validated, and whether re-issued, making cascade of       invariance-breaking, these kinds of things. I.e., it's particular to       each device its characteristics and protocol in effect, and the model       the "arithmetization" in effect. It's figured that as performance is       low-priority, boot-time has the compiling the invariants and making the       world, so, it's undefined yet what expectation that would have. About       fixed-length segments and with regards to cacheline (that memory       coherence is always in cache-lines anyways), and about variable-length       codes or compressed-codes, or for example making sparse codes (each       coherent alone), these are matters of the organization the sizes and       units/atomicity. It's figured that the image can include all the       generic/universal drivers, so, then it is just a blob, where it may       check itself, as part of "KEST" or "Post-Start Self-Test PSST", that       otherwise whether or how it's signed is external. Then, the idea that it       is to fit into boot media like the boot sector or boot record, is about       the boot-loader and the idea that it may result as a UEFI application or       other usual notions of DeviceTree and semantics of BIOS after POST. The       idea of "co-operative concurrency" with "fairness and constancy" and       "zero trust" together makes for a good idea about then whether two       instances would trust each other, and whether they would be willing to       trade, or to enter into transactional contexts, with the idea that       according to a blind algorithm, they could be swapped, as an example of       designing for "correctness, diagnosibility, performance", where              [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca