Rust bootloader pushed up to GitHub! It's a small (20 KiB) PXE bootloader written in Rust, that can boot a relocated 64-bit PE for a kernel. Code is up https://t.co/hYQKHmAHwn . Next stream we will start work on the kernel. For those who missed the stream: https://t.co/l8lyMt8XnA
Introducing Orange Slice. A new research kernel and hypervisor, with the end goal of getting a hardware-virtualization accelerated fully-deterministic emulator. I'll be starting development live on YouTube on Wednesday to kick things off. Read more https://t.co/hYQKHmAHwn
Orange Slice is a research kernel and hypervisor with an end goal of creating a deterministic hypervisor. This will be developed almost entirely in my free time, and will probably move slow. However I will try to stream almost all dev for this project, such that people can ask questions and hopefully learn a thing or two about kernel and hypervisor development! This deterministic hypervisor is going to be designed from the start for fuzzing. Having determinism in a hypervisor would allow us to never have an issue with reproducing a bug, regardless of how complex the bug is. However as a hypervisor we will benefit from the performance of hardware-accelerated virtualization. The end goal is a deterministic hypervisor, capable of booting Windows and Linux, with less than a 5x performance slowdown to achieve instruction-and-cycle level determinism for cycle counts and interrupt boundaries.
Calle de Pradillo, 42 Calle de Pradillo, 42 Madrid, ES
36 Rustaceans Attending
Llegó la primavera, y con ella otra ración de programación de sistemas con Rust. Alberto Ruiz  es un Engineering Manager en Red Hat  en el equipo de Bootloader. En su charla se sumergirá en UEFI , la especificación de firmware estándar en la mayoría de sistemas Intel para consumidores; y mostrará cómo compilar un Hello World básico (y quiz…
Someone needs to sit down and clarify the various UEFI Rust bindings/libraries, which ones are better than others, which are usable, etc. I think there’s about 4 different Rust/UEFI implementations now.
Here’s a new set of UEFI/Rust bindings and samples.
The object of this document is to provide hints and recommendations for secure applications development using the Rust programming language. It is not intended to be a course on how to write Rust programs, there are already plenty of good learning resources for this purpose (see the External references section below). The purpose is rather to guide the programmer and to inform him about certain pitfalls, especially in case he is involved in the development of applications with strong security requirements. These recommendations form a complement to the good level of trust the Rust language already provides. That said, recalls are sometimes necessary for clarity, and the experienced Rust programmer may rely solely on Recommendation or Warning inserts.
The r-efi project provides the protocol constants and definitions of the UEFI Reference Specification as native rust code. The scope of this project is limited to those protocol definitions. The protocols are not actually implemented. As such, this project serves as base for any UEFI application that needs to interact with UEFI, or implement (parts of) the UEFI specification.
A library to parse ACPI tables and AML, written in Rust. Designed to be easy to use from inside a kernel written in Rust, and fully tested. Acpi is currently very early in development, will be highly unstable and is next to useless for actually parsing ACPI or AML.
Nikolaj is learning Rust. He just rewrote one C tool to Rust:
A personal note from an experienced C programmer who also happens to be Rust noob-in-training: Rust is worth poking with a stick even if you won't ever use it in production, because it can show new approaches and methods that can be used later in less safe languages.
You must be logged in to post a comment.