============================================================
AREPO G — EVACUATIO ADMISSIBILITY & DIAGNOSTICS (REWRITE)
Ars Generalis Applied — AREPO Layer
Version: 1.0.0-AREPO-G-MAGNUM-NORMALIZED
Status: PROPOSED / VALIDATION TARGET
Authority: AREPO (bound to TENET G)
Scope: Admissibility, validation, and diagnostics for Evacuatio
Mutation Policy: VERSION-CONTROLLED ONLY

Class: AREPO
============================================================


<!-- LOCAL_SECTION_INDEX_START -->
## LOCAL SECTION INDEX

Scope: local anchors within this artifact only. No cross-artifact links are introduced here.

- [SECTION 1 — PURPOSE & CLASS ROLE](#local-section-07-stack-g-arepo-g-inputadmissibility-section-1-purpose-class-role)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle)
- [ROLE](#local-section-07-stack-g-arepo-g-inputadmissibility-role)
- [AREPO G:](#local-section-07-stack-g-arepo-g-inputadmissibility-arepo-g)
- [NON-ROLE](#local-section-07-stack-g-arepo-g-inputadmissibility-non-role)
- [CORE PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-core-principle)
- [SEPARATION LAW](#local-section-07-stack-g-arepo-g-inputadmissibility-separation-law)
- [SECTION 2 — ADMISSIBILITY PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-section-2-admissibility-principle)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-2)
- [FORMAL THESIS](#local-section-07-stack-g-arepo-g-inputadmissibility-formal-thesis)
- [INTERPRETATION](#local-section-07-stack-g-arepo-g-inputadmissibility-interpretation)
- [CONSTRAINT](#local-section-07-stack-g-arepo-g-inputadmissibility-constraint)
- [FAILURE CONDITIONS](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-conditions)
- [SECTION 3 — PRE-EXECUTION GATE](#local-section-07-stack-g-arepo-g-inputadmissibility-section-3-pre-execution-gate)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-3)
- [GATE CONDITIONS](#local-section-07-stack-g-arepo-g-inputadmissibility-gate-conditions)
- [VALIDATION RULES](#local-section-07-stack-g-arepo-g-inputadmissibility-validation-rules)
- [CONSTRAINT](#local-section-07-stack-g-arepo-g-inputadmissibility-constraint-2)
- [FAILURE CLASSES](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes)
- [SEVERITY](#local-section-07-stack-g-arepo-g-inputadmissibility-severity)
- [SECTION 4 — TENET ENFORCEMENT](#local-section-07-stack-g-arepo-g-inputadmissibility-section-4-tenet-enforcement)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-4)
- [VALIDATED INVARIANTS](#local-section-07-stack-g-arepo-g-inputadmissibility-validated-invariants)
- [VALIDATION FUNCTION](#local-section-07-stack-g-arepo-g-inputadmissibility-validation-function)
- [FAILURE CLASSES](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-2)
- [SEVERITY](#local-section-07-stack-g-arepo-g-inputadmissibility-severity-2)
- [SECTION 5 — MODE VALIDATION & EQUIVALENCE](#local-section-07-stack-g-arepo-g-inputadmissibility-section-5-mode-validation-equivalence)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-5)
- [MODES](#local-section-07-stack-g-arepo-g-inputadmissibility-modes)
- [EQUIVALENCE LAW](#local-section-07-stack-g-arepo-g-inputadmissibility-equivalence-law)
- [VALIDATION](#local-section-07-stack-g-arepo-g-inputadmissibility-validation)
- [CONSTRAINT](#local-section-07-stack-g-arepo-g-inputadmissibility-constraint-3)
- [FAILURE CLASSES](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-3)
- [SEVERITY](#local-section-07-stack-g-arepo-g-inputadmissibility-severity-3)
- [SECTION 6 — POST-EXECUTION VALIDATION](#local-section-07-stack-g-arepo-g-inputadmissibility-section-6-post-execution-validation)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-6)
- [POSTCONDITION](#local-section-07-stack-g-arepo-g-inputadmissibility-postcondition)
- [VALIDATION CHECKS](#local-section-07-stack-g-arepo-g-inputadmissibility-validation-checks)
- [CONSTRAINT](#local-section-07-stack-g-arepo-g-inputadmissibility-constraint-4)
- [FAILURE CLASSES](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-4)
- [SEVERITY](#local-section-07-stack-g-arepo-g-inputadmissibility-severity-4)
- [SECTION 7 — TRACEABILITY ENFORCEMENT](#local-section-07-stack-g-arepo-g-inputadmissibility-section-7-traceability-enforcement)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-7)
- [REQUIRED TRACE](#local-section-07-stack-g-arepo-g-inputadmissibility-required-trace)
- [VALIDATION](#local-section-07-stack-g-arepo-g-inputadmissibility-validation-2)
- [CONSTRAINT](#local-section-07-stack-g-arepo-g-inputadmissibility-constraint-5)
- [FAILURE CLASSES](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-5)
- [SEVERITY](#local-section-07-stack-g-arepo-g-inputadmissibility-severity-5)
- [SECTION 8 — FAILURE CLASSIFICATION](#local-section-07-stack-g-arepo-g-inputadmissibility-section-8-failure-classification)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-8)
- [FAILURE TYPES](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-types)
- [BLOCKING:](#local-section-07-stack-g-arepo-g-inputadmissibility-blocking)
- [NON_BLOCKING:](#local-section-07-stack-g-arepo-g-inputadmissibility-non-blocking)
- [STRUCTURAL_WARNING:](#local-section-07-stack-g-arepo-g-inputadmissibility-structural-warning)
- [DEFAULT POLICY](#local-section-07-stack-g-arepo-g-inputadmissibility-default-policy)
- [DIAGNOSTIC STRUCTURE](#local-section-07-stack-g-arepo-g-inputadmissibility-diagnostic-structure)
- [RULE](#local-section-07-stack-g-arepo-g-inputadmissibility-rule)
- [SECTION 9 — FAILURE PROPAGATION](#local-section-07-stack-g-arepo-g-inputadmissibility-section-9-failure-propagation)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-9)
- [PROPAGATION CHAIN](#local-section-07-stack-g-arepo-g-inputadmissibility-propagation-chain)
- [CONSTRAINT](#local-section-07-stack-g-arepo-g-inputadmissibility-constraint-6)
- [FAILURE CLASSES](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-6)
- [SEVERITY](#local-section-07-stack-g-arepo-g-inputadmissibility-severity-6)
- [SECTION 10 — EXECUTION ADMISSION CONTRACT](#local-section-07-stack-g-arepo-g-inputadmissibility-section-10-execution-admission-contract)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-10)
- [FORMULA](#local-section-07-stack-g-arepo-g-inputadmissibility-formula)
- [EFFECT](#local-section-07-stack-g-arepo-g-inputadmissibility-effect)
- [CONSTRAINT](#local-section-07-stack-g-arepo-g-inputadmissibility-constraint-7)
- [FAILURE CLASSES](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-7)
- [SEVERITY](#local-section-07-stack-g-arepo-g-inputadmissibility-severity-7)
- [SECTION 11 — OUTPUT ACCEPTANCE CONTRACT](#local-section-07-stack-g-arepo-g-inputadmissibility-section-11-output-acceptance-contract)
- [PRINCIPLE](#local-section-07-stack-g-arepo-g-inputadmissibility-principle-11)
- [FORMULA](#local-section-07-stack-g-arepo-g-inputadmissibility-formula-2)
- [EFFECT](#local-section-07-stack-g-arepo-g-inputadmissibility-effect-2)
- [CONSTRAINT](#local-section-07-stack-g-arepo-g-inputadmissibility-constraint-8)
- [FAILURE CLASSES](#local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-8)
- [SEVERITY](#local-section-07-stack-g-arepo-g-inputadmissibility-severity-8)
- [SECTION 12 — FUNCTION & CLOSURE](#local-section-07-stack-g-arepo-g-inputadmissibility-section-12-function-closure)
- [FUNCTION](#local-section-07-stack-g-arepo-g-inputadmissibility-function)
- [SYSTEM ROLE](#local-section-07-stack-g-arepo-g-inputadmissibility-system-role)
- [FINAL LAW](#local-section-07-stack-g-arepo-g-inputadmissibility-final-law)
- [CLOSURE CONDITION](#local-section-07-stack-g-arepo-g-inputadmissibility-closure-condition)
- [Status: PROPOSED / VALIDATION TARGET](#local-section-07-stack-g-arepo-g-inputadmissibility-status-proposed-validation-target)
<!-- LOCAL_SECTION_INDEX_END -->

============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-1-purpose-class-role"></a>
SECTION 1 — PURPOSE & CLASS ROLE
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle"></a>
PRINCIPLE
------------------------------------------------------------

AREPO G governs admissibility and diagnostics
for all Evacuatio operations.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-role"></a>
ROLE
------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-arepo-g"></a>
AREPO G:

    • validates input requests
    • enforces TENET G invariants
    • controls OPERA execution permission
    • validates output structure
    • emits diagnostics

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-non-role"></a>
NON-ROLE
------------------------------------------------------------


AREPO G does NOT:

    • execute Evacuatio (OPERA)
    • define doctrine (TENET)
    • define topology (ROTA)
    • mediate outputs (SATOR)

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-core-principle"></a>
CORE PRINCIPLE
------------------------------------------------------------

Only lawful Evacuatio may be executed or accepted.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-separation-law"></a>
SEPARATION LAW
------------------------------------------------------------

AREPO G ≠ OPERA G ≠ TENET G ≠ ROTA G ≠ SATOR G

============================================================
END SECTION 1
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-2-admissibility-principle"></a>
SECTION 2 — ADMISSIBILITY PRINCIPLE
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-2"></a>
PRINCIPLE
------------------------------------------------------------

A request is admissible only if fully lawful.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-formal-thesis"></a>
FORMAL THESIS
------------------------------------------------------------

ADMIT(request) ⇔

    lawful(camera)
    ∧ lawful(bindings)
    ∧ lawful(mode)
    ∧ no_regime_collapse
    ∧ dependencies_resolved

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-interpretation"></a>
INTERPRETATION
------------------------------------------------------------


AREPO evaluates:

    structure, not usefulness

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-constraint"></a>
CONSTRAINT
------------------------------------------------------------

All conditions must hold simultaneously.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-conditions"></a>
FAILURE CONDITIONS
------------------------------------------------------------

unlawful_request
partial_binding
inadmissible_structure

============================================================
END SECTION 2
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-3-pre-execution-gate"></a>
SECTION 3 — PRE-EXECUTION GATE
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-3"></a>
PRINCIPLE
------------------------------------------------------------

No execution may begin without AREPO admission.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-gate-conditions"></a>
GATE CONDITIONS
------------------------------------------------------------

admissible(request) ⇔

    valid_camera(request.camera)
    ∧ bound(TENET_A)
    ∧ bound(TENET_T)
    ∧ bound(TENET_E)
    ∧ valid_mode(request.mode)
    ∧ no_regime_collapse
    ∧ dependencies_resolved

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-validation-rules"></a>
VALIDATION RULES
------------------------------------------------------------


valid_camera:

    camera ∈ FIGURA_TERTIA


valid_mode:

    mode ∈ {GENERATIVE, PREPROCESSED}

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-constraint-2"></a>
CONSTRAINT
------------------------------------------------------------


If any condition fails:

    execution must not proceed

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes"></a>
FAILURE CLASSES
------------------------------------------------------------

INVALID_CAMERA
TENET_BINDING_MISSING
INVALID_MODE
REGIME_COLLAPSE
UNRESOLVED_DEPENDENCY

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-severity"></a>
SEVERITY
------------------------------------------------------------


All failures are:

    BLOCKING

============================================================
END SECTION 3
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-4-tenet-enforcement"></a>
SECTION 4 — TENET ENFORCEMENT
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-4"></a>
PRINCIPLE
------------------------------------------------------------

AREPO enforces TENET G invariants.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-validated-invariants"></a>
VALIDATED INVARIANTS
------------------------------------------------------------

• domain restriction (FIGURA TERTIA)
• cardinality (12–12–24)
• dependency chain
• medium uniqueness
• determinism
• preprocessed equivalence
• non-collapse

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-validation-function"></a>
VALIDATION FUNCTION
------------------------------------------------------------


validate_tenet(output):

    assert camera ∈ FIGURA_TERTIA
    assert |statements| = 12
    assert |media| = 12
    assert |questions| = 24
    assert dependency_chain_intact
    assert media_uniqueness
    assert deterministic_equivalence
    assert no_layer_collapse

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-2"></a>
FAILURE CLASSES
------------------------------------------------------------

TENET_DOMAIN_VIOLATION
CARDINALITY_VIOLATION
DEPENDENCY_BREAK
MEDIUM_VIOLATION
NON_DETERMINISM
STRUCTURAL_COLLAPSE

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-severity-2"></a>
SEVERITY
------------------------------------------------------------


All TENET violations are:

    BLOCKING

============================================================
END SECTION 4
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-5-mode-validation-equivalence"></a>
SECTION 5 — MODE VALIDATION & EQUIVALENCE
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-5"></a>
PRINCIPLE
------------------------------------------------------------

Execution modes must be lawful and equivalent.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-modes"></a>
MODES
------------------------------------------------------------

GENERATIVE
PREPROCESSED

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-equivalence-law"></a>
EQUIVALENCE LAW
------------------------------------------------------------

GENERATIVE(camera)
    ≡
PREPROCESSED(camera)

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-validation"></a>
VALIDATION
------------------------------------------------------------


Outputs must be identical in:

    • statements
    • media
    • questions
    • structure

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-constraint-3"></a>
CONSTRAINT
------------------------------------------------------------

No divergence allowed between modes.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-3"></a>
FAILURE CLASSES
------------------------------------------------------------

MODE_MISMATCH
NON_EQUIVALENT_OUTPUT
PREPROCESSED_DIVERGENCE

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-severity-3"></a>
SEVERITY
------------------------------------------------------------

BLOCKING

============================================================
END SECTION 5
============================================================
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-6-post-execution-validation"></a>
SECTION 6 — POST-EXECUTION VALIDATION
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-6"></a>
PRINCIPLE
------------------------------------------------------------

All OPERA outputs must be validated after execution.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-postcondition"></a>
POSTCONDITION
------------------------------------------------------------

valid(output) ⇔

    structure_valid
    ∧ resolution_complete
    ∧ trace_complete
    ∧ no_missing_elements

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-validation-checks"></a>
VALIDATION CHECKS
------------------------------------------------------------

• all statements present (12)
• all media present (12)
• all questions present (24)
• all questions resolved
• dependency chain preserved
• no structural collapse

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-constraint-4"></a>
CONSTRAINT
------------------------------------------------------------

Validation must be exhaustive.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-4"></a>
FAILURE CLASSES
------------------------------------------------------------

INCOMPLETE_EXECUTION
UNRESOLVED_QUERY
MISSING_ELEMENT
DEPENDENCY_BREAK
STRUCTURAL_COLLAPSE

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-severity-4"></a>
SEVERITY
------------------------------------------------------------

BLOCKING

============================================================
END SECTION 6
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-7-traceability-enforcement"></a>
SECTION 7 — TRACEABILITY ENFORCEMENT
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-7"></a>
PRINCIPLE
------------------------------------------------------------

No Evacuatio output may be opaque.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-required-trace"></a>
REQUIRED TRACE
------------------------------------------------------------

trace :=
{
    camera_origin,
    derivation_chain,
    TENET_bindings,
    execution_mode,
    statement_question_ancestry
}

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-validation-2"></a>
VALIDATION
------------------------------------------------------------


assert:

    • all fields present
    • chamber reconstructable
    • statement ancestry reconstructable
    • question ancestry reconstructable

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-constraint-5"></a>
CONSTRAINT
------------------------------------------------------------


Trace must support:

    • full reconstruction
    • structural inspection

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-5"></a>
FAILURE CLASSES
------------------------------------------------------------

TRACE_MISSING
TRACE_INCOMPLETE
TRACE_NON_RECONSTRUCTIBLE
OPAQUE_OUTPUT

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-severity-5"></a>
SEVERITY
------------------------------------------------------------

BLOCKING

============================================================
END SECTION 7
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-8-failure-classification"></a>
SECTION 8 — FAILURE CLASSIFICATION
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-8"></a>
PRINCIPLE
------------------------------------------------------------

All failures must be explicit and typed.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-types"></a>
FAILURE TYPES
------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-blocking"></a>
BLOCKING:
    execution denied or output invalid


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-non-blocking"></a>
NON_BLOCKING:
    lawful output with warning


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-structural-warning"></a>
STRUCTURAL_WARNING:
    potential drift risk

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-default-policy"></a>
DEFAULT POLICY
------------------------------------------------------------


For Evacuatio:

    almost all failures are BLOCKING

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-diagnostic-structure"></a>
DIAGNOSTIC STRUCTURE
------------------------------------------------------------

DIAGNOSTIC :=
{
    code,
    type,
    stage,
    violated_condition,
    affected_elements
}

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-rule"></a>
RULE
------------------------------------------------------------

No silent failure.

============================================================
END SECTION 8
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-9-failure-propagation"></a>
SECTION 9 — FAILURE PROPAGATION
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-9"></a>
PRINCIPLE
------------------------------------------------------------

Failures must propagate without mutation.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-propagation-chain"></a>
PROPAGATION CHAIN
------------------------------------------------------------

AREPO
    → OPERA
    → SATOR (if applicable)

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-constraint-6"></a>
CONSTRAINT
------------------------------------------------------------


Failures must not be:

    • masked
    • reinterpreted
    • downgraded implicitly

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-6"></a>
FAILURE CLASSES
------------------------------------------------------------

MASKED_FAILURE
REINTERPRETED_FAILURE
INVALID_RECOVERY

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-severity-6"></a>
SEVERITY
------------------------------------------------------------

BLOCKING

============================================================
END SECTION 9
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-10-execution-admission-contract"></a>
SECTION 10 — EXECUTION ADMISSION CONTRACT
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-10"></a>
PRINCIPLE
------------------------------------------------------------

AREPO defines when OPERA may execute.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-formula"></a>
FORMULA
------------------------------------------------------------

ADMIT_TO_OPERA(request) ⇔

    admissible(request)
    ∧ tenet_bindings_lawful
    ∧ mode_equivalence_valid

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-effect"></a>
EFFECT
------------------------------------------------------------


If TRUE:

    OPERA execution allowed


If FALSE:

    execution denied

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-constraint-7"></a>
CONSTRAINT
------------------------------------------------------------

OPERA must not self-authorize execution.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-7"></a>
FAILURE CLASSES
------------------------------------------------------------

ADMISSION_DENIED
PRE_EXECUTION_REJECTION

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-severity-7"></a>
SEVERITY
------------------------------------------------------------

BLOCKING

============================================================
END SECTION 10
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-11-output-acceptance-contract"></a>
SECTION 11 — OUTPUT ACCEPTANCE CONTRACT
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-principle-11"></a>
PRINCIPLE
------------------------------------------------------------

AREPO defines when output is valid.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-formula-2"></a>
FORMULA
------------------------------------------------------------

ACCEPT_OUTPUT(output) ⇔

    tenet_valid(output)
    ∧ post_execution_valid(output)
    ∧ trace_valid(output)

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-effect-2"></a>
EFFECT
------------------------------------------------------------


If TRUE:

    output accepted


If FALSE:

    output rejected

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-constraint-8"></a>
CONSTRAINT
------------------------------------------------------------

Partial validity is not allowed.

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-failure-classes-8"></a>
FAILURE CLASSES
------------------------------------------------------------

OUTPUT_REJECTED
POST_EXECUTION_INVALID
TRACE_FAILURE

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-severity-8"></a>
SEVERITY
------------------------------------------------------------

BLOCKING

============================================================
END SECTION 11
============================================================


============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-section-12-function-closure"></a>
SECTION 12 — FUNCTION & CLOSURE
============================================================


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-function"></a>
FUNCTION
------------------------------------------------------------


AREPO G governs:

    • admissibility of requests
    • enforcement of TENET G
    • validation of OPERA outputs
    • traceability enforcement
    • diagnostics emission

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-system-role"></a>
SYSTEM ROLE
------------------------------------------------------------


AREPO G is:

    • control gate
    • validation authority
    • diagnostic interface

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-final-law"></a>
FINAL LAW
------------------------------------------------------------


AREPO admits only that which is:

    structurally lawful
    fully closed
    fully traceable

------------------------------------------------------------


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-closure-condition"></a>
CLOSURE CONDITION
------------------------------------------------------------


A request/output is valid iff:

    it satisfies all TENET G invariants
    and passes all AREPO checks

------------------------------------------------------------


ANY violation implies:

    inadmissibility

============================================================
END SECTION 12
============================================================


============================================================
END AREPO G — EVACUATIO ADMISSIBILITY & DIAGNOSTICS (REWRITE)
Version: 1.0.0-AREPO-G-MAGNUM-NORMALIZED


<a id="local-section-07-stack-g-arepo-g-inputadmissibility-status-proposed-validation-target"></a>
Status: PROPOSED / VALIDATION TARGET
============================================================


