Forums before death by AOL, social media and spammers... "We can't have nice things"
|    sci.logic    |    Logic -- math, philosophy & computationa    |    262,912 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 261,478 of 262,912    |
|    Ross Finlayson to And you    |
|    Re: Meta: a usenet server just for sci.m    |
|    29 Nov 25 03:54:23    |
      [continued from previous message]              So your goal — a headless server runtime with POSIX compatibility,       minimal kernel surface, predictable behavior — is very much aligned with       known pressures on server and cloud OS design.              ---              ## ⚠ What remains as trade‑offs / design risks, given your stricter       constraints              Because you aggressively freeze topology, device set, and rely on       precomputed invariants, you trade **flexibility and broad       compatibility** for **determinism and simplicity**. That trade-off       carries real consequences:              * Many commodity or future devices (USB hubs, GPUs, exotic NICs,       hot‑plug PCIe, user-level graphics/AV) may simply become unsupported by       the kernel. As a result, software relying on those will need user‑land       support (if feasible) or will be incompatible.       * The ecosystem advantage of existing monolithic kernels (wide driver       support, dynamic device addition/removal, dynamic module loading) is       lost. That means your system will be niche, or must enforce strict       hardware/environment control.       * Compatibility with standard expectations (for example, user       plug‑and‑play, hot-swapping, variable peripheral sets) becomes harder or       impossible. For certain deployment domains (embedded, server appliances,       minimal containers) this may be acceptable; but for general‑purpose or       consumer desktops this is a big limitation.              But — given your target domain (headless server, container/node runtime,       cloud/distributed environment) — these trade‑offs may indeed be       **rational and appropriate**.              ---              ## 🎯 Where Your Design is Particularly Well‑Positioned & Interesting              * **Deterministic I/O and constant-time kernel paths** — this is rare in       commodity OS design, which often accepts variability (interrupt latency,       driver scheduling, dynamic memory). If you succeed, your OS could       provide significantly more predictable latency and performance       guarantees than typical Linux/Unix-derived systems.       * **Minimal kernel footprint and simpler auditability/tracing** — by       reducing kernel size and complexity, you reduce attack surface, improve       auditability, and make formal reasoning about system behavior more       tractable.       * **Clear separation between hardware‑bound deterministic code (P0) and       flexible user-land (P3/POSIX)** — this separation is a strong argument       for maintainability, portability (across architectures), and long-term       stability in controlled hardware environments (servers, appliances,       embedded nodes).       * **Suitability for controlled cloud / cluster / container       environments** — many cloud nodes or container hosts already run on       known, stable, minimal hardware. Your OS is well matched to that world,       especially when reliability, reproducibility, and time‑guarantees matter       more than hardware variety.       * **A good evolutionary foundation for research or specialized       deployments** — your design can serve as a platform for deterministic       networking, real-time distributed services, safety‑critical edge       computing, or hardened isolation setups.              ---              ## 🧠 My Perceived Interest — and What I’d Watch for If I Were       Collaborating or Building              If I were working with you, I’d be very excited about this as a       **proof‑of‑concept OS for deterministic, headless server use**. I’d       especially want to test:              * A minimal configuration: e.g. one CPU, one NIC + NVMe + console —       verify O(1) paths, DMA scheduling, fixed latency under load.       * Behavior under load: many simultaneous I/O streams, network traffic,       DMA bursts — to measure worst-case latencies, consistency, and determinism.       * Auditability: logging and trace buffer behaviour, ability to inspect       “what happened when, on which core/device/user/process” — valuable for       debugging, forensics, reproducibility.       * Portability: moving from one hardware topology to another with the       same policy invariant and seeing how well the system adapts (or refuses       to run).              I think this design is **not a general-purpose consumer OS candidate** —       it is too constrained for that. But as a **specialized runtime for       cloud, cluster, embedded, or safety‑critical applications**, it has high       potential.              ---              ## 💡 My Recommendation (Given Your Goals & This Design)              Continue treating the video essays as **internal design lore /       inspiration**, but use **public, documented OS design literature and       research** (papers, microkernel histories, data‑center OS proposals)       when you need to ground design decisions or guarantee broader reasoning       acceptability.              Maintain the “design charter” and invariant‑freezing ethos strictly.       For any new “nice-to-have” feature (hot-plug, dynamic driver load,       etc.), require an explicit cost/benefit analysis — if the cost is       increased variability or complexity, push it to user‑land or mask it.              Prioritize building a **small prototype** — early empirical validation       will give you the real feedback and credibility that theory alone cannot.              ---              If you like, I can **pull up a short reading list** of publicly       documented OS‑design/papers/research (microkernels, data‑center OS,       deterministic I/O or real-time OS) that seem most relevant to your       approach — sort of a “foundations + adjacent research” list.       That way you have a **bibliography** to cross-reference as you build       “Deep OS / Critix.”       Do you want me to build that reading list now, for you?              [1]: https://en.wikipedia.org/wiki/POSIX?utm_source=chatgpt.com "POSIX"       [2]:       https://dev.to/adityabhuyan/understanding-server-operating-syste       s-the-backbone-of-modern-it-infrastructure-d8h?utm_source=chatgpt.com       "Understanding Server Operating Systems: The Backbone of Modern IT       Infrastructure - DEV Community"       [3]: https://arxiv.org/abs/1901.00825?utm_source=chatgpt.com "XOS: An       Application-Defined Operating System for Data Center Servers"                                   Thanks ChatGPT. It's considered un-safe to move kernel-land resources to       user-land, as with regards to notions like "NIST Orange Boot" and       "non-root user" and "user-land". Here it's figured that HID-less       workflows mostly would employ the footprint of resources of a container,       according to ACPI and UEFI resulting DeviceTree, "topo-time", about       notions like Popek (sp.) and Goldberg about virtualization requirements,       in a usual "virts & visors" hypervisor/cluster setting. It's considered       that these containers never change resources, since they are always       considered ephemeral instances. With the notion of surfacing to       user-land usual notions of the HID to make for general-purpose or       consumer operating systems, as above that about the minimal with regards       to HID inputs, and usually audio and video, as with regards for example       to independent units like GPUs or graphics acceleration or audio units       and mixing, would be for that those would be as for an informational       setting, while the HID-less operating system, is more normative. It's       figured that since the re-routine's definition is the same as       synchronous blocking, while it can also be interpreted as asynchronous       concurrent non-blocking, then is for testing the code with different       includes and linkages (and thus compilations) what results tests in       high-level language, then for an emulator (which may be low-performance       yet would still run test coverage fine) as a model of asynchronous       concurrency, then that the idea of instrumentation involved acts as a       natural logging of time-series operation.                     Yes — that all makes sense, and it’s a very careful framing. Let me              [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca