Canonical Kernel
The authoritative governance vocabulary for deterministic trust infrastructure. Terms are frozen. Invariants are immutable. Interpretation is external.
Scope
This document defines the canonical governance vocabulary, authority stack, cross-system mappings, and file extension policy for the ValidKernel ecosystem. All Kernel Documents, LDS payloads, and execution environments SHALL conform to the definitions herein.
Conformance Language
The key words MUST, MUST NOT, SHALL, SHALL NOT, SHOULD, and MAY are to be interpreted as described in RFC 2119.
Governance Glossary
Eight canonical terms define the entire ValidKernel vocabulary. These terms are frozen. Nothing in the ecosystem is allowed to redefine them.
- L0 or L1 only
- Cannot delegate to L2
- Immutable
- Time-bounded
- Scope-limited
- Stateless
- Non-executing
- Fail-closed
- Cannot authorize
- Cannot validate
- Bounded execution
- No decisions
- No authority
- Fully auditable
- Immutable once issued
- Pre-execution eval
- Global
- Versioned
- Immutable
- Immutable
- Tamper-evident
- Chronological
Authority Stack
Authority flows downward only. No component can grant itself authority.
Crosswalk Matrix
Maps each governance concept across four system layers, preventing semantic drift and enabling fast audits.
| Concept | Glossary Term | Kernel Invariant | Kernel Document | LDS Payload |
|---|---|---|---|---|
| Authority | Authority | KRN.IV.01 | header.authority | _lds.authority |
| Validation | Kernel | KRN.IV.02 | validation_block | n/a |
| Execution | Executor | KRN.IV.03 | executor_spec | worker_id |
| Scope | Policy | KRN.IV.04 | permissions | ruleset |
| Audit | Audit Log | KRN.IV.08 | audit | append_log |
Canonical File Extension Policy
Two extensions. One carries authority. One carries data. The distinction is non-negotiable.
- L0 Commands
- Kernel Invariant Specifications
- Governance Directives
- Kernel payloads
- Deterministic data inputs
- Non-authoritative execution data
Stability Guarantees
The rules that govern this vocabulary cannot be weakened. Only extended.
- Glossary terms SHALL NOT be redefined.
- Invariants SHALL NOT be removed.
- Extensions SHALL remain backward compatible.
Security Consideration
Misclassification of authority-bearing documents is a critical failure. A data file cannot impersonate a governance directive. Format confusion enables privilege escalation.
Status
This document is FINAL and enters force immediately upon publication.