Skip to content

How are you planning to enforce safety? #4

@kFYatek

Description

@kFYatek

Other language-based operating systems, which are based on e.g. JVM or CLR, get away with not having CPU-level user mode or memory protection by having a virtual machine, which is known to take safety precautions (including verifying safety of the user-mode executable bytecode).

But Rust is compiled to native code. rustc invoked on RustOS will probably also just generate x86 (or whatever target architecture) code. How do you plan to distinguish between Rust-compiled, safe (I bet you plan to ban the unsafe keyword) binaries and some malicious code that one may put together using assembly or C or whatever and put on a RustOS machine?

Or are you planning to take some form of bytecode and compile upon exec() (or equivalent)?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions