-
Couldn't load subscription status.
- Fork 17
Description
Other language-based operating systems, which are based on e.g. JVM or CLR, get away with not having CPU-level user mode or memory protection by having a virtual machine, which is known to take safety precautions (including verifying safety of the user-mode executable bytecode).
But Rust is compiled to native code. rustc invoked on RustOS will probably also just generate x86 (or whatever target architecture) code. How do you plan to distinguish between Rust-compiled, safe (I bet you plan to ban the unsafe keyword) binaries and some malicious code that one may put together using assembly or C or whatever and put on a RustOS machine?
Or are you planning to take some form of bytecode and compile upon exec() (or equivalent)?