Developed for over 30 years, Linux has already become the computing foundation for today's digital world; from gigantic, complex mainframes (e.g., supercomputers) to cheap, wimpy embedded devices (e.g., IoTs), countless applications are built on top of it. Yet, such an infrastructure has been plagued by numerous memory and concurrency bugs since the day it was born, due to many rogue memory operations are permitted by C language. A recent project Rust-for-Linux (RFL) has the potential to addr...| www.usenix.org
Example: Writing a Kernel in About 100 Lines of Safe Rust| asterinas.github.io
Historically, formal verification has largely focused on specialized, verification-friendly operating systems (OSes) such as seL4, CertiKOS, Verve, and Atmosphere. These OSes are deliberately small and often lack many of the common features found in full-fledged, UNIX-style OSes.| asterinas.github.io
How can one build a feature-rich, general-purpose, Rust-based operating system (OS) with a minimal and sound Trusted Computing Base (TCB) for memory safety? Existing Rust-based OSes fall short due to their improper use of unsafe Rust in kernel development. To address this challenge, we propose a novel OS architecture called framekernel that realizes Rust's full potential to achieve intra-kernel privilege separation, ensuring TCB minimality and soundness. We present OSTD, a streamlined framewo...| arXiv.org
[undefined]| doc.rust-lang.org