- Rust 99.2%
- Linker Script 0.8%
| .github | ||
| src | ||
| .editorconfig | ||
| .gitignore | ||
| .markdownlint-cli2.yaml | ||
| ARCHITECTURE.md | ||
| Cargo.toml | ||
| CODE_OF_CONDUCT.md | ||
| CONTRIBUTING.md | ||
| LICENSE | ||
| linker.ld | ||
| README.md | ||
| ROADMAP.md | ||
| rustfmt.toml | ||
| SECURITY.md | ||
EriX Pager Service (pagerd)
pagerd is the user-space paging/backing policy service. It provides page
content and page-fault resolution policy for managed mappings.
EriX is a clean-room, capability-based microkernel operating system written entirely in Rust.
Technical requirements are tracked in the EriX requirements, conventions, and project documentation.
See:
- docs for design documents, specifications, and development plans.
- Related architecture repositories for kernel, services, libraries, drivers, and integration tooling.
Purpose of This Repository
This repository implements the EriX pager service daemon. Its purpose in EriX is to provide the pager service role through explicit IPC and startup authority.
Functionally, it implements the daemon runtime, state model, IPC handling, and validation tests. The repository keeps the implementation, interface contracts, tests, and documentation for that behavior in one reviewable ownership boundary.
The maintained responsibilities are:
- implement the pager service runtime and state model
- validate startup authority before accepting IPC requests
- handle bounded service operations through the assigned endpoint set
- keep service behavior, tests, and authority invariants documented
Clean-Room Policy
EriX follows a strict clean-room philosophy:
- No external source code may be copied.
- No external Rust crates are allowed.
- No code generation tools that embed third-party code.
- All code must be authored within the project.
Violations will result in rejection of the contribution.
License
All EriX repositories are licensed under the ISC License.
Development Model
EriX development is modular, deterministic, reproducible, authority-explicit, security-first, and self-hosting oriented.
This repository follows the project roadmap and the validation rules documented in its own roadmap.
Implementation Status
Runtime baseline:
no_stdexecutable service binary (x86_64-unknown-none) with SysV entry ABI- startup envelope parsing/validation via
lib-bootstrap - role/intake contract validation via
lib-capabi - runtime IPC server loop (
RECV+REPLY) for pager fault/resolve messages - primary control slot is the dedicated pager/fault endpoint
SLOT_KERNEL_PAGER_ENDPOINT (2256) - image-backed fault resolution now uses an explicit pagerd-local image-frame
slot seeded by
rootd, not the canonical boot-module-table slot pagerdnow maps that shared image backing only inside the per-process image range explicitly registered byprocd; faults outside that range fall back to anonymous demand-zero allocation- deterministic fault-id tracking and resolve response policy
Authority cleanup status:
pagerdnow accepts explicit register/unregister process-vspace requests fromprocd- runtime fault resolution maps through the registered delegated VSPACE cap, not
by treating
process_idas ambient VSPACE authority - downstream phase0
vspacedmap requests now sendreserved0 = 0instead of compatibility process metadata - both the image-backed and anonymous-fallback runtime map paths reuse that same zero-reserved request shape; pagerd does not widen authority by reintroducing compatibility metadata on fallback faults
- the registration contract now includes image-backed virtual-address bounds so
pagerdcan keep anonymous faults isolated across processes that share the same boot image frame source
Governance Principles
pagerd governance is scoped to pager service behavior and fault-response
policy.
The scoped governance rules are:
- It responds only to paging authority assigned by startup contracts.
- It keeps fault handling deterministic and bounded by process memory policy.
- It validates page requests before mapping or backing memory.
- It does not receive unrelated device, filesystem, or service-discovery authority.
Authority Boundaries
pagerdoperates only through startup-assigned service capabilities.- New authority must be represented in bootstrap/capability validation and integration tests before use.
Contact
Development occurs in EriX organization and discussions happen in issues and design documents.
No decisions are considered valid without documented rationale.
Maintainers can be reached via email: admin@erikinkinen.fi.