asterinas/README.md

68 lines
5.8 KiB
Markdown
Raw Normal View History

# Jinux
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
Jinux is a _secure_, _fast_, and _general-purpose_ OS kernel, written in Rust and providing Linux-compatible ABI.
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
Jinux is designed and implemented with an emphasis on security, rendering it highly attractive for usage scenarios where Linux ABI is indispensable, but Linux itself is deemed insecure given its sheer size of TCB and its nature of being memory unsafe. An instance of such usage is employing Jinux as the guest OS for VM TEEs (e.g., [AMD SEV](https://www.amd.com/en/developer/sev.html) and [Intel TDX](https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html)).
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
## What's unique about Jinux?
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
Jinux is a _zero-cost_, _least-privilege_ OS kernel. A least-privilege OS is one that adheres to the principle of least privileges, which mandates that every unit (e.g., a subsystem, a module, a function, or even an object) of the OS has the minimum authority and permissions required to perform its tasks. This approach reduces the security risk associated with any single element's bugs or flaws. By "zero-cost", we means the same as in Rust's philosophy of zero-cost abstractions, which emphasizes that high-level abstractions (like those that enable least privilege principles) should be available to developers to use, but not come at the cost of performance. Thus, a zero-cost, least-privilege OS enhances its security without compromising its performance.
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
Some prior OSes do abide by the [principle of least privilege](https://en.wikipedia.org/wiki/Principle_of_least_privilege), but come with considerable performance costs. Take [seL4](https://sel4.systems/) as an example. A [seL4-based multi-server OS](https://docs.sel4.systems/projects/camkes/) minimizes the scope of the OS running in the privileged CPU mode to the seL4 microkernel. The bulk of OS functionalities are implemented by process-based servers, which are separated by process boundary and only allowed to communicate with each other through well-defined interfaces, usually based on RPC. Each service can only access kernel resources represented by [seL4 capabilities](), each of which is restricted with respect to its scope and permissions. All these security measures contribute to the enhanced security of the OS, but result in a considerable runtime costs due to context switching, message passing, and runtime checks.
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
Jinux is unique in practicing the principle of least privilege without sacrificing the performance. This is achieved by realizing the full potential of Rust, which, compared to the traditional system programming language like C/C++, offers unique features like an expressive type system, memory safety with unsafe extensions, powerful macros, and a customizable toolchain. By leveraging these unique features, Jinux is able to construct zero-cost abstractions that enable least privileges at the following three levels.
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
1. The architectural level. Jinux is architected as a _framekernel_, where the entire OS resides in a single address space and unsafe Rust code is restricted to a tiny portion of the OS called Jinux Framework. The Framework exposes safe APIs to the rest of Jinux, which implements the most of OS functionalities in safe Rust code completely. Thanks to the framekernel architecture, Jinux's TCB for memory safety is minimized.
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
2. The component level. Upon Jinux Framework is a set of OS components, each of which is responsible for a particular OS functionality, feature, or device. These OS components are Rust crates with two traits: (1) containing safe Rust code, as demanded by the framekernel architecture, and (2) being governed by Jinux Component System, which can enforce a fine-grained access control to their public APIs. The access control policy is specified in a configuration file and enforced at compile time, using a static analysis tool.
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
3. The object level. Jinux promotes the philosophy of _everything-is-a-capability_, which means all kernel resources, from files to threads, from virtual memory to physical pages, should be accessed through [capabilities](https://en.wikipedia.org/wiki/Capability-based_security). In Jinux, capabilities are implemented as Rust objects that are constrained in their creation, acquisition, and usage. One common form of capabilities is those with access rights. Wherever possible, access rights are encoded in types (rather than values) so that they can be checked at compile time, eliminating any runtime costs.
2022-05-18 06:26:07 +00:00
2023-03-14 15:44:00 +00:00
As a zero-cost, least-privilege OS, Jinux provides the best of both worlds: the performance of a monolithic kernel and the security of a microkernel. Like a monolithic kernel, the different parts of Jinux can communicate with the most efficient means, e.g., function calls and memory sharing. In the same spirit as a microkernel, the fundamental security properties of the OS depend on a minimum amount of code (i.e., Jinux Framework).
2022-05-18 06:26:07 +00:00
2022-08-08 22:43:47 +00:00
## How to build and test
2022-05-18 06:26:07 +00:00
2022-08-08 22:43:47 +00:00
While most code is written in Rust, the project-scope build process is governed
by Makefile.
2022-08-31 07:10:40 +00:00
Before downloading source code, install and init Git LFS since the project manage binaries with Git LFS.
```bash
# 1. install git-lfs
brew install git-lfs # for mac
apt install git-lfs # for ubuntu
# 2. init git-lfs for current user
git lfs install --skip-repo # for mac & ubuntu
```
Then, download source codes as normal.
```bash
git clone [repository url]
```
2022-08-17 03:22:49 +00:00
After downloading the source code, run the following command once to make sure
all developmennt tools are installed.
```bash
make setup
```
2023-02-07 08:05:21 +00:00
Then, install some standalone tools (e.g., `cargo-component`) under the project directory.
``` bash
make tools
```
Set environmental variables to enable `cargo` find installed tools.
```bash
export PATH=`pwd`/src/target/bin:${PATH}
```
2022-08-17 03:22:49 +00:00
Then, we can build and test the project.
2022-08-08 22:43:47 +00:00
```bash
make
2022-08-17 03:22:49 +00:00
```
If everything goes well, then we can run the OS.
```bash
make run
```