vspaced is the user-space virtual address-space policy service. It governs mapping layout policy and address-space construction above kernel primitives.
Find a file
Erik Inkinen 8fd52f5276
All checks were successful
CI / test (push) Successful in 5s
CI / security (push) Successful in 1m27s
CI / minimal-versions (push) Successful in 11s
vspaced: drop unstable rustfmt options for stable toolchains
2026-03-23 10:19:57 +02:00
.github refactor: Update milestone terminology to component milestone tracking across documentation 2026-03-05 11:56:30 +02:00
src vspaced: split runtime and startup paths 2026-03-23 09:37:40 +02:00
.editorconfig Initial commit 2026-02-26 17:47:33 +01:00
.gitignore Initial commit 2026-02-26 17:47:33 +01:00
ARCHITECTURE.md runtime-mode: migrate feature gates and document mode model 2026-03-11 08:04:59 +02:00
Cargo.toml runtime-mode: migrate feature gates and document mode model 2026-03-11 08:04:59 +02:00
CODE_OF_CONDUCT.md Initial commit 2026-02-26 17:47:33 +01:00
CONTRIBUTING.md refactor: Update milestone terminology to component milestone tracking across documentation 2026-03-05 11:56:30 +02:00
LICENSE Initial commit 2026-02-26 17:47:33 +01:00
linker.ld Update linker script and main module for improved memory layout and IPC handling 2026-03-03 16:14:49 +02:00
README.md refactor: Update milestone terminology to component milestone tracking across documentation 2026-03-05 11:56:30 +02:00
ROADMAP.md runtime-mode: migrate feature gates and document mode model 2026-03-11 08:04:59 +02:00
rustfmt.toml vspaced: drop unstable rustfmt options for stable toolchains 2026-03-23 10:19:57 +02:00
SECURITY.md docs: align security policy phase numbering 2026-03-11 05:28:15 +02:00

EriX Virtual Space Service (vspaced)

vspaced is the user-space virtual address-space policy service. It governs mapping layout policy and address-space construction above kernel primitives.


Scope

  • create/manage process virtual address-space layouts by policy
  • enforce mapping constraints (permissions, region classes, placement rules)
  • coordinate with pagerd for backing decisions when mappings require paging support

Out of Scope

  • page content backing policy
  • process lifecycle ownership policy

Inputs and Outputs

  • startup contract: docs/handoff/root-to-services.md
  • receives mapping-related capabilities from rootd
  • exposes address-space/mapping IPC services to authorized clients

Invariants

  • no ambient mapping authority
  • deterministic mapping decisions for deterministic policy inputs
  • strict least-privilege interface to clients

Implementation Status

Runtime baseline:

  • no_std executable service binary (x86_64-unknown-none) with SysV entry ABI
  • startup envelope parsing/validation via lib-bootstrap
  • role/intake contract validation via lib-capabi
  • runtime IPC server loop (RECV + REPLY) for map/unmap requests
  • deterministic mapping table validation and response behavior