Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

39C3 - Xous: A Pure-Rust Rethink of the Embedded Operating System

Автор: media.ccc.de

Загружено: 2026-01-08

Просмотров: 14687

Описание:

Xous is a message-passing microkernel implemented in pure Rust, targeting secure embedded applications. This talk covers three novel aspects of the OS: hardware MMU support (and why we had to make our own chip to get this feature), how and why we implemented the Rust standard library in Rust (instead of calling the C standard library, like most other Rust platforms), and how we combine the power of Rust semantics with virtual memory to create safe yet efficient asynchronous messaging primitives. We conclude with a short demo of the OS running on a new chip, the "Baochip-1x", which is an affordable, mostly-open RTL SoC built in 22nm TSMC, configured expressly for running Xous.

The world is full of small, Internet-of-Things (IoT) gadgets running embedded operating systems. These devices generally fall into two categories: larger devices running a full operating system using an MMU which generally means Linux, or smaller devices running without an MMU using operating systems like Zephyr, chibios, or rt-thread, or run with no operating system at all. The software that underpins these projects is written in C with coarse hardware memory protection at best. As a result, these embedded OSes lack the security guarantees and/or ergonomics offered by modern languages and best practices.

The Xous microkernel borrows concepts from heavier operating systems to modernize the embedded space. The open source OS is written in pure Rust with minimal dependencies and an emphasis on modularity and simplicity, such that a technically-savvy individual can audit the code base in a reasonable period of time. This talk covers three novel aspects of the OS: its incorporation of hardware memory virtualization, its pure-Rust standard library, and its message passing architecture.

Desktop OSes such as Linux require a hardware MMU to virtualize memory. We explain how ARM has tricked us into accepting that MMUs are hardware-intensive features only to be found on more expensive “application” CPUs, thus creating a vicious cycle where cheaper devices are forced to be less safe. Thanks to the open nature of RISC-V, we are able to break ARM’s yoke and incorporate well-established MMU-based memory protection into embedded hardware, giving us security-first features such as process isolation and encrypted swap memory. In order to make Xous on real hardware more accessible, we introduce the Baochip-1x, an affordable, mostly-open RTL 22nm SoC configured expressly for the purpose of running Xous. The Baochip-1x features a Vexriscv CPU running at 400MHz, 2MiB of SRAM, 4MiB of nonvolatile RRAM, and a quad-core RV32E-derivative I/O accelerator called the “BIO”, based on the PicoRV clocked at 800MHz.

Most Rust targets delegate crucial tasks such as memory allocation, networking, and threading to the underlying operating system’s C standard library. We want strong memory safety guarantees all the way down to the memory allocator and task scheduler, so for Xous we implemented our standard library in pure Rust. Adhering to pure Rust also makes cross-compilation and cross-platform development a breeze, since there are no special compiler or linker concerns. We will show you how to raise the standard for “Pure Rust” by implementing a custom libstd.

Xous combines the power of page-based virtual memory and Rust’s strong borrow-checker semantics to create a safe and efficient method for asynchronous message passing between processes. This inter-process communication model allows for easy separation of different tasks while keeping the core kernel small. This process maps well onto the Rust "Borrow / Mutable Borrow / Move" concept and treats object passing as an IPC primitive. We will demonstrate how this works natively and give examples of how to map common programming algorithms to shuttle data safely between processes, as well as give examples of how we implement features such as scheduling and synchronization primitive entirely in user space.

We conclude with a short demo of Xous running on the Baochip-1x, bringing Xous from the realm of emulation and FPGAs into everyday-user accessible physical silicon.

bunnie, Sean "xobs" Cross

https://events.ccc.de/congress/2025/h...

#39c3 #Hardware

Licensed to the public under http://creativecommons.org/licenses/b...

39C3 - Xous: A Pure-Rust Rethink of the Embedded Operating System

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

39C3 - Watch Your Kids: Inside a Children's Smartwatch

39C3 - Watch Your Kids: Inside a Children's Smartwatch

39C3 - Building hardware - easier than ever - harder than it should be

39C3 - Building hardware - easier than ever - harder than it should be

39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities

39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities

39C3 - How To Minimize Bugs in Cryptography Code

39C3 - How To Minimize Bugs in Cryptography Code

💾СОБРАЛ NAS НА TrueNAS💽 НЕ ПОНИМАЮ, КАК ЖИЛ БЕЗ НЕГО САМОДЕЛЬНОЕ ХРАНИЛИЩЕ ЭТО ПРОСТО

💾СОБРАЛ NAS НА TrueNAS💽 НЕ ПОНИМАЮ, КАК ЖИЛ БЕЗ НЕГО САМОДЕЛЬНОЕ ХРАНИЛИЩЕ ЭТО ПРОСТО

The Windows 11 Disaster Microsoft Didn’t See Coming

The Windows 11 Disaster Microsoft Didn’t See Coming

JetKVM - девайс для удаленного управления вашими ПК

JetKVM - девайс для удаленного управления вашими ПК

Звонки без блокировок - Свой мессенджер на homelab

Звонки без блокировок - Свой мессенджер на homelab

39C3 - When 8 Bits is Overkill: Making Blinkenlights with a 1-bit CPU

39C3 - When 8 Bits is Overkill: Making Blinkenlights with a 1-bit CPU

39C3 - Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot

39C3 - Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot

Building the PERFECT Linux PC with Linus Torvalds

Building the PERFECT Linux PC with Linus Torvalds

Эфир - Самое ЛЕТУЧЕЕ Вещество на Земле!

Эфир - Самое ЛЕТУЧЕЕ Вещество на Земле!

Self-Reproducing Programs

Self-Reproducing Programs

The World's Most Important Machine

The World's Most Important Machine

Введение в Embassy: разработка встраиваемых систем с использованием асинхронного Rust

Введение в Embassy: разработка встраиваемых систем с использованием асинхронного Rust

Покойся с миром, Arduino и Open Hardware... спасибо Qualcomm

Покойся с миром, Arduino и Open Hardware... спасибо Qualcomm

39C3 - Breaking architecture barriers: Running x86 games and apps on ARM

39C3 - Breaking architecture barriers: Running x86 games and apps on ARM

39C3 - Set-top box Hacking: freeing the 'Freebox'

39C3 - Set-top box Hacking: freeing the 'Freebox'

The Original Sin of Computing...that no one can fix

The Original Sin of Computing...that no one can fix

Самая сложная модель из тех, что мы реально понимаем

Самая сложная модель из тех, что мы реально понимаем

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com