ferros VS hubris

Compare ferros vs hubris and see what are their differences.

ferros

A Rust-based userland which also adds compile-time assurances to seL4 development. (by auxoncorp)

hubris

A lightweight, memory-protected, message-passing kernel for deeply embedded systems. (by oxidecomputer)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
ferros hubris
9 33
102 2,808
1.0% 2.4%
0.0 9.6
9 months ago about 15 hours ago
Rust Rust
Apache License 2.0 Mozilla Public License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

ferros

Posts with mentions or reviews of ferros. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-07-25.
  • Unix-like OS in Rust inspired by xv6-riscv
    7 projects | news.ycombinator.com | 25 Jul 2023
    My company, https://www.auxon.io. We created https://github.com/auxoncorp/ferros originally to enable a customer project early in the company's life cycle.

    Some time later we had another customer interested in using it and having us add some features to it (e.g. some device drivers and a persistence layer utilizing https://docs.rs/tickv/latest/tickv/). It was becoming a massive pain in the neck to work out source code sharing agreements with them, so we decided to just open source it.

    There are quite a number of things that we would do differently if we had to build it again, and at some point will likely do that work to revise it. The biggest one of those is root task synthesis. The other is to build and bring in facilities for running tasks that are compiled to WASM.

  • Writing an OS in Rust to run on RISC-V
    8 projects | news.ycombinator.com | 1 Mar 2023
    When we add WASM support to https://github.com/auxoncorp/ferros it'll sorta be like what you're angling at there in your description.
  • My Fear of Commitment to the First CPU Core
    2 projects | news.ycombinator.com | 12 Feb 2023
    We've built things on seL4 (https://github.com/auxoncorp/ferros). We like to joke that it's the most perfect piece of nearly featureless software ever made.

    There's... A LOT... of work to do before seL4 is going to be anywhere near usability parity with something like Linux, unfortunately.

    Rather than make a general purpose OS, we decided to use it more like a unikernel or "library OS" where you're trying to make a well defined kind of "appliance" image to deploy to specific hardware rather than try to fake being a POSIX-y shaped OS.

  • FerrOS: Rust-y unikernels on seL4
    2 projects | /r/rust | 9 Nov 2022
    For what it's worth, here's FerrOS's repo as well as the underlying selfe repo
  • Tokio Console
    11 projects | news.ycombinator.com | 17 Dec 2021
    That's basically what we did with https://github.com/auxoncorp/ferros, Bundle Rust programs together as tasks to run atop the formally verified seL4 microkernel.
  • Hubris – An OS from Oxide Computer
    7 projects | news.ycombinator.com | 30 Nov 2021
    We also built a Rust framework called FerrOS (https://github.com/auxoncorp/ferros) atop the formally-verified seL4 microkernel.

    It has a similar set of usage idioms to Hubris it looks like in terms of trying to setup as much as possible ahead of time to assemble what's kind of an application specific operating system where everything your use case needs is assembled at build-time as a bunch of communicating tasks running on seL4.

    We recently added a concise little persistence interface that pulls in TicKV (https://docs.tockos.org/tickv/index.html) from the Tock project you referenced above, and some provisions are being added for some more dynamic task handling based on some asks from an automotive OEM.

  • Genode – Sculpt Operating System 21.10
    1 project | news.ycombinator.com | 16 Oct 2021
    We built a thing to enable combining Rust applications together to be hosted on the seL4 microkernel. The developer experience is more akin to that of something like an RTOS where the OS and your applications are built and deployed together. The whole premise of it is decidedly non-POSIX-like. The current point is for assembling software for use-case-specific/appliance computing, not general purpose computing. (https://github.com/auxoncorp/ferros)

    We're looking both for contributors and also actively hiring for a couple engineering positions for the above and for or mainline product.

  • OSv Unikernel – Optimizing Guest OS to Run Stateless and Serverless Apps
    4 projects | news.ycombinator.com | 9 Oct 2021
    I tried and failed to bring unikernels to my former work when I was at Visa. Specifically, LING.

    At my current company, Auxon, we recently open sourced[1] some work we did a couple years back which is more or less an attempt at the basic foundations for blending the seL4 microkernel with fairly normal no_std Rust application development and assembling them all together to make a purpose built OS/application to deploy directly to hardware or within a VM. We have some work to do to keep building it up as a foundation for broader use, but we're looking into partnering with the seL4 Foundation (now under the Linux Foundation) to iterate on it further with some of our other mutual partners. The developer experience is much closer to that of developing for an RTOS than it is like typical general purpose computing development.

    I'm of course biased, but I think there's a lot of room to innovate in the space of use case specific software stacks where the domain and constraints are well understood and too many degrees of freedom are actually a hindrance and a liability, not an advantage.

    [1] https://github.com/auxoncorp/ferros

  • Open sourced: Easier builds and stronger types for seL4 with Rust
    2 projects | /r/rust | 10 Sep 2021
    On top of that is ferros (no relation to to ferrous-systems), a higher-level userland of unreasonably strong types for compile-time resource tracking. No more discovering you need more memory, or capability slots or IPC rights at runtime. These types help you fit the right seL4 screw to the right seL4 screwdriver.

hubris

Posts with mentions or reviews of hubris. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-10-26.
  • Framework won't be just a laptop company anymore
    1 project | news.ycombinator.com | 24 Apr 2024
    > The CPUs in Oxide racks are AMD, so, presumably AMD-based compute rather than ARM.

    These don’t run Hubris though; based on the chips directory in the repo [0], they’re targeting a mix of NXP and ST parts, which are Arm, and the user isn’t likely to see them or care what firmware they’re running: they’re really pretty “boring”.

    [0] : https://github.com/oxidecomputer/hubris/tree/020d014880382d8...

  • Who killed the network switch? A Hubris Bug Story
    1 project | news.ycombinator.com | 26 Mar 2024
    I wouldn't put this comment here. It's not just some detail of this function; it's an invariant of the field that all writers have to respect (maybe this is the only one now but still) and all readers can take advantage of. So I'd add it to the `TaskDesc::regions` docstring. [1]

    [1] https://github.com/oxidecomputer/hubris/commit/b44e677fb39cd...

  • Oxide: The Cloud Computer
    9 projects | news.ycombinator.com | 26 Oct 2023
    With respect to Hubris, the build badge was, in turns out, pointing to a stale workflow. (That is, the build was succeeding, but the build badge was busted.) This comment has been immortalized in the fix.[0]

    With respect to Humility, I am going to resist the temptation of pointing out why one of those directories has a different nomenclature with respect to its delimiter -- and just leave it at this: if you really want to find some filthy code in Humility, you can do much, much better than that!

    [0] https://github.com/oxidecomputer/hubris/commit/651a9546b20ce...

  • Barracuda Urges Replacing – Not Patching – Its Email Security Gateways
    2 projects | news.ycombinator.com | 11 Jun 2023
    A lot of questions in there! Taking these in order:

    1. We aren't making standalone servers: the Oxide compute sled comes in the Oxide rack. So are not (and do not intend to be) a drop in replacement for extant rack mounted servers.

    2. We have taken a fundamentally different approach to firmware, with a true root of trust that can attest to the service processor -- which can turn attest to the system software. This prompts a lot of questions (e.g., who attests to the root of trust?), and there is a LOT to say about this; look for us to talk a lot more about this

    3. In stark contrast (sadly) to nearly everyone else in the server space, the firmware we are developing is entirely open source. More details on that can be found in Cliff Biffle's 2021 OSFC talk and the Hubris and Humility repos.[0][1][2]

    4. Definitely not vaporware! We are in the process of shipping to our first customers; you can follow our progress in our Oxide and Friends podcast.[3]

    [0] https://www.osfc.io/2021/talks/on-hubris-and-humility-develo...

    [1] https://github.com/oxidecomputer/hubris

    [2] https://github.com/oxidecomputer/humility

    [3] https://oxide-and-friends.transistor.fm/

  • Do you use Rust in your professional career?
    6 projects | /r/rust | 9 May 2023
  • Spotting and Avoiding Heap Fragmentation in Rust Applications
    3 projects | news.ycombinator.com | 6 Apr 2023
    everywhere, for example in https://github.com/oxidecomputer/hubris/search?q=dyn

    Is Box really allocating here? Is the "Rust By Example" text incomplete?

    Then I had to stop learning Rust for other reasons, but this doubt really hit me at the time.

  • What's the coolest thing you've done with Neovim?
    11 projects | /r/neovim | 4 Mar 2023
    I work on an embedded OS in Rust (Hubris) that has a very bespoke build system. As part of the build system, it has to set environmental variables based on (1) the target device and (2) the specific "task"; this is an OS with task-level isolation, so tasks are compiled as individual Rust crates.
  • TCG TPM2.0 implementations vulnerable to memory corruption
    1 project | news.ycombinator.com | 28 Feb 2023
    Oxide Computer told some storied about the difficulty of bring up of a new motherboard, and mentioned a lot of gotcha details and hack solutions for managing their AMD chip.

    They talked about their bring up sequence, boot chain verification on their motherboard, and designing / creating / verifying their hardware root of trust.

    I heard mention of this on a podcast recently, trying to find the reference.

    I'm pretty sure it was [S3]

    - "Tales from the Bringup Lab" https://lnns.co/FBf5oLpyHK3

    - or "More Tales from the Bringup Lab" https://lnns.co/LQur_ToJX9m

    But I found again these interesting things worth sharing on that search. https://oxide.computer/blog/hubris-and-humility, https://github.com/oxidecomputer/hubris

    Search 1 [S1], Trammell Hudson ep mentioning firmware (chromebook related iirc) https://lnns.co/pystdPm0QvG.

    Search 2 [S2], Security, Cryptography, Whatever podcast episode mentioning Oxide and roots of trust or similar. https://lnns.co/VnyTvdhBiGC

    Search links:

    [S1]: https://www.listennotes.com/search/?q=oxide+tpm

    [S2]: https://www.listennotes.com/search/?q=oxide%20and%20friends%...

    [S3]: https://www.listennotes.com/search/?q=oxide%20and%20friends%...

  • Well-documented Embedded dev board for video, ethernet, usb, file IO, etc
    1 project | /r/rust | 25 Jan 2023
  • OpenAI Used Kenyan Workers on Less Than $2 per Hour to Make ChatGPT Less Toxic
    3 projects | news.ycombinator.com | 18 Jan 2023
    When we started the company, we knew it would be a three year build -- and indeed, our first product is in the final stages of development (i.e. EMC/safety certification). We have been very transparent about our progress along the way[0][1][2][3][4][5][6][7] -- and our software is essentially all open source, so you can follow along there as well.[8][9][10]

    If you are asking "does anyone want a rack-scale computer?" the (short) answer is: yes, they do. The on-prem market has been woefully underserved -- and there are plenty of folks who are sick of Dell/HPE/VMware/Cisco, to say nothing of those who are public cloud borne and wondering if they should perhaps own some of their own compute rather than rent it all.

    [0] https://oxide-and-friends.transistor.fm/episodes/holistic-bo...

    [1] https://oxide-and-friends.transistor.fm/episodes/the-oxide-s...

    [2] https://oxide-and-friends.transistor.fm/episodes/bringup-lab...

    [3] https://oxide-and-friends.transistor.fm/episodes/more-tales-...

    [4] https://oxide-and-friends.transistor.fm/episodes/another-lpc...

    [5] https://oxide-and-friends.transistor.fm/episodes/the-pragmat...

    [6] https://oxide-and-friends.transistor.fm/episodes/tales-from-...

    [7] https://oxide-and-friends.transistor.fm/episodes/the-sidecar...

    [8] https://github.com/oxidecomputer/omicron

    [9] https://github.com/oxidecomputer/propolis

    [10] https://github.com/oxidecomputer/hubris

What are some alternatives?

When comparing ferros and hubris you can also consider the following projects:

nanos - A kernel designed to run one and only one application in a virtualized environment

tock - A secure embedded operating system for microcontrollers

Trusted-CGI - Lightweight runner for lambda functions/apps in CGI like mode

esp32 - Peripheral access crate for the ESP32

rust - Empowering everyone to build reliable and efficient software.

meta-raspberrypi - Yocto/OE BSP layer for the Raspberry Pi boards

tracing - Application level tracing for Rust.

esp32-hal - A hardware abstraction layer for the esp32 written in Rust.

console - a debugger for async rust!

l4v - seL4 specification and proofs

OPS - ops - build and run nanos unikernels

git-subrepo