vspaced is the user-space virtual address-space policy service. It governs mapping layout policy and address-space construction above kernel primitives.
  • Rust 99%
  • Linker Script 1%
Find a file
Erik Inkinen 15eb790fbf
All checks were successful
CI / markdown (push) Successful in 3s
CI / test (push) Successful in 13s
Tighten CI markdown policy
2026-05-22 15:10:44 +03:00
.github Tighten CI markdown policy 2026-05-22 15:10:44 +03:00
src Bind direct-frame physical RAM in vspaced 2026-04-24 09:14:16 +03:00
.editorconfig Initial commit 2026-02-26 17:47:33 +01:00
.gitignore Ignore local .ci workspace 2026-04-15 21:53:05 +03:00
.markdownlint-cli2.yaml Tighten CI markdown policy 2026-05-22 15:10:44 +03:00
ARCHITECTURE.md Tighten CI markdown policy 2026-05-22 15:10:44 +03:00
Cargo.toml runtime-mode: migrate feature gates and document mode model 2026-03-11 08:04:59 +02:00
CODE_OF_CONDUCT.md Tighten CI markdown policy 2026-05-22 15:10:44 +03:00
CONTRIBUTING.md Tighten CI markdown policy 2026-05-22 15:10:44 +03:00
LICENSE Initial commit 2026-02-26 17:47:33 +01:00
linker.ld Harden vspaced startup and direct mappings 2026-04-24 09:14:16 +03:00
README.md Tighten CI markdown policy 2026-05-22 15:10:44 +03:00
ROADMAP.md Tighten CI markdown policy 2026-05-22 15:10:44 +03:00
rustfmt.toml vspaced: drop unstable rustfmt options for stable toolchains 2026-03-23 10:19:57 +02:00
SECURITY.md Tighten CI markdown policy 2026-05-22 15:10:44 +03:00

EriX Virtual Space Service (vspaced)

vspaced is the user-space virtual address-space policy service. It governs mapping layout policy and address-space construction above kernel primitives.

EriX is a clean-room, capability-based microkernel operating system written entirely in Rust.

Technical requirements are tracked in the EriX requirements, conventions, and project documentation.

See:

  • docs for design documents, specifications, and development plans.
  • Related architecture repositories for kernel, services, libraries, drivers, and integration tooling.

Purpose of This Repository

This repository implements the EriX vspace service daemon. Its purpose in EriX is to provide the vspace service role through explicit IPC and startup authority.

Functionally, it implements the daemon runtime, state model, IPC handling, and validation tests. The repository keeps the implementation, interface contracts, tests, and documentation for that behavior in one reviewable ownership boundary.

The maintained responsibilities are:

  • implement the vspace service runtime and state model
  • validate startup authority before accepting IPC requests
  • handle bounded service operations through the assigned endpoint set
  • keep service behavior, tests, and authority invariants documented

Clean-Room Policy

EriX follows a strict clean-room philosophy:

  • No external source code may be copied.
  • No external Rust crates are allowed.
  • No code generation tools that embed third-party code.
  • All code must be authored within the project.

Violations will result in rejection of the contribution.

License

All EriX repositories are licensed under the ISC License.

Development Model

EriX development is modular, deterministic, reproducible, authority-explicit, security-first, and self-hosting oriented.

This repository follows the project roadmap and the validation rules documented in its own roadmap.

Implementation Status

Runtime baseline:

  • no_std executable service binary (x86_64-unknown-none) with SysV entry ABI
  • startup envelope parsing/validation via lib-bootstrap
  • role/intake contract validation via lib-capabi
  • startup ready-state validates actual local slot type/rights with caller-local QUERY_LOCAL_CAP on bare metal and QUERY_CAP in host/test scaffolding
  • the host/test QUERY_CAP fallback is cfg-scoped so runtime/release builds remain warning-free
  • runtime IPC server loop (RECV + REPLY) for map/unmap requests
  • primary control slot is the dedicated vspace endpoint SLOT_KERNEL_VSPACE_ENDPOINT (2240)
  • deterministic mapping table validation and response behavior
  • the emitted runtime image now keeps any declared .bss.stack_reserve reservation so the startup stack remains inside explicit in-image stack space instead of colliding with live service state

Authority cleanup status:

  • runtime map/unmap now pass the delegated local vspace_cap_slot directly to the kernel vspace endpoint
  • the trailing phase0 map/unmap reserved0 field must be zero in v1 and does not influence target selection
  • linker garbage collection must not discard the declared stack reserve; vspaced now keeps .bss.stack_reserve* explicitly in the runtime image.

Governance Principles

vspaced governance is scoped to virtual address-space service behavior.

The scoped governance rules are:

  • It uses only assigned address-space authority for explicit callers.
  • It validates map, unmap, and protection requests before changing process address spaces.
  • It keeps address-space policy in user space while preserving kernel isolation guarantees.
  • It does not receive storage, driver, or service-discovery authority.

Authority Boundaries

  • vspaced operates only through startup-assigned service capabilities.
  • New authority must be represented in bootstrap/capability validation and integration tests before use.

Contact

Development occurs in EriX organization and discussions happen in issues and design documents.

No decisions are considered valid without documented rationale.

Maintainers can be reached via email: admin@erikinkinen.fi.