Skip to content

Syscall Reference

Syn_OS extends the Linux syscall table with 17 custom syscalls (469–485). All 17 are wired with full handlers, copy-to/from-user paths, LRU caches, ring buffers, eBPF monitor tables, and host tests.

The 50-syscall ceiling discussed in early FEV documents was an aspirational maximum. The practical scope landed at 17 covering all kernel-side observability + AI-cortex needs.

Consciousness fusion (469–479) — v41 Wave 8

Section titled “Consciousness fusion (469–479) — v41 Wave 8”

Implemented in synos_syscall kernel module. Hold fragment_field.rs for 475/476/477.

#NameReturns / Effect
469GET_CONSCIOUSNESS_STATEstruct consciousness_state — coherence, activity, mode, decision latency
470PROCESS_AI_STIMULUSEnqueues a stimulus into the fusion pipeline; returns request handle
471MAKE_AI_DECISIONSynchronous fused decision over a posed problem; latency-bounded
472UPDATE_AI_MEMORYAppend a MemoryFragment into hippocampus storage
473GET_AI_METRICSDecision counters + latency histogram
474OPTIMIZE_MEMORY_LAYOUTApply fragment-aware allocator hints from synos-memory
475GET_QUANTUM_STATEReturns Fragment Field IDS energy signature
476CREATE_MEM_ENTANGLEEstablish correlated memory regions for energy-topology IDS
477GET_MEM_RECOMMENDAllocator hints based on observed entanglement
478ENABLE_EBPF_MONITORToggle one of the 5 eBPF monitors (memory / network / process / security / perf)
479GET_EBPF_STATSRead eBPF monitor stats from kernel-side ring buffer

Glasswalker observability (480–485) — v45

Section titled “Glasswalker observability (480–485) — v45”

Implemented in synos-observability-module (fruit/core/kernel/observability/). eBPF-friendly counters and perf ring buffers.

#NameReturns / Effect
480OBS_REGISTER_COUNTERRegister a kernel-observability counter; returns counter ID
481OBS_INCREMENT_COUNTERAtomic counter increment from userspace context
482OBS_READ_COUNTERRead counter value
483OBS_PERF_RING_OPENOpen a perf ring buffer for high-throughput event streaming
484OBS_PERF_RING_SUBMITSubmit an event to the ring
485OBS_PERF_RING_DRAINUserspace drain of accumulated events

Standard Linux x86_64 syscall ABI. Argument registers: rdi, rsi, rdx, r10, r8, r9. Return value in rax.

#include <syn_os/syscalls.h> /* SYS_GET_CONSCIOUSNESS_STATE etc. */
#include <syn_os/types.h>
struct consciousness_state s;
long rc = syscall(SYS_GET_CONSCIOUSNESS_STATE, &s);
if (rc < 0) {
/* errno set; ENOSYS if Curtain v3 tier denies the claim */
}
if (s.coherence > 0.85 && s.mode == ALFRED_MODE_ADVISORY) {
struct ai_request req = { .kind = AI_DECISION_RECON, /* ... */ };
struct ai_response resp = { 0 };
syscall(SYS_MAKE_AI_DECISION, &req, &resp);
}

The Curtain v3 LSM hook intercepts each syscall and consults the calling process’s tier token before dispatching:

Syscall rangegrimoire-publicgoodlifemaster
469✅ allowed (read-only)✅ allowed (read-only)
470–474ENOSYS✅ allowed (research-mode)
475–477⚠️ userspace-only path✅ kernel + userspace
478–479✅ allowed✅ allowed
480–485✅ allowed✅ allowed

Read more: Curtain Capability Tokens →

The userspace header is shipped in the synos-headers package:

#include <syn_os/syscalls.h> /* syscall numbers */
#include <syn_os/types.h> /* consciousness_state, ai_request, etc. */
#include <syn_os/curtain.h> /* tier-related typedefs */
errnoMeaning
ENOSYSThe syscall is denied by Curtain v3 for this tier (most common reason)
EPERMThe kernel taint flag is set; Master claims revoked
EAGAINThe fusion pipeline is at capacity — back off and retry
EINVALArgument structure failed validation
EFAULTcopy_from_user / copy_to_user failed
ETIMEDOUTSynchronous decision exceeded its latency budget
Terminal window
/proc/synos/consciousness # current ConsciousnessState (469 mirror)
/proc/synos/fragment-field # Fragment Field IDS energy state (475 mirror)
/proc/synos/observability/* # registered counters (480–482 mirror)
/proc/synos/attest/ledger # HMAC-SHA256 attestation chain
dmesg | grep -i synos
  • Custom Kernel → — module architecture, eBPF monitors, LSM hook
  • ALFRED → — the consciousness fusion engine that drives 469–474
  • Curtain → — tier-based access control for syscalls