pico-bootrom
xous-core
pico-bootrom | xous-core | |
---|---|---|
15 | 12 | |
250 | 508 | |
0.0% | 1.8% | |
0.0 | 9.9 | |
over 2 years ago | 5 days ago | |
C | Rust | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pico-bootrom
- How is data in RAM loaded at startup?
-
Raspberry Pi Pico W: your $6 IoT platform
Espressif is years ahead.
Original RPi-pico has only few one-ups on ESP - BSD-licensed bootrom [0] and PIO.
PicoW doesn't have any, at all. Disappointingly lazy move from pi foundation.
[0] https://github.com/raspberrypi/pico-bootrom/
- Raspberry Pi Pico: What is this code doing in its boot ROM, line 442?
- Raspberry Pi Pico: What is this obfuscated code(?) doing in its boot ROM (l.442)
-
Raspberry Pi Pico: What is this obfuscated code(?) doing in its boot ROM?
Crosslinking the two posts: https://github.com/raspberrypi/pico-bootrom/issues/17
-
Another Vulnerability in the LPC55S69 ROM
I would think that the bootloader code wouldn't use any funky IP blocks - it's not some sort of driver code into which applications call, it's just a special application that runs before anything else. It has to be able to talk UART (or some other interface), check signatures, and write flash. All of these the user code can do as well.
There are many "user-space" bootloaders as well for various chips. The factory bootloader is only different in that it sits in ROM. For example, RP2040 ROM bootloader is here https://github.com/raspberrypi/pico-bootrom
- Why does the pico accept Microsoft uf2 format rather than raw ARM machine code?
- RP2040 USB Bootloader?
xous-core
- Rust 1.72 seems to optimize away security checks
-
Writing an OS in Rust to run on RISC-V
Xous, the OS that runs on the precursor, may be of interest to look at too:
https://github.com/betrusted-io/xous-core
It is written in Rust and is targeted for a RISC-V
-
Is there any reliable guide for creating an operating system in Rust?
In addition to phil-opp and redox, there's the Betrusted project's Xous kernel, which runs on a RISC-V core that runs on an FPGA. There's even an Xous Book.
- How can I call cargo commands from rust?
-
Another Vulnerability in the LPC55S69 ROM
You might be interested in Precursor and the Betrusted Platform.
https://www.crowdsupply.com/sutajio-kosagi/precursor
They are trying to have an hardware platform that can be inspected and it is based on an FPGA with a RISC-V Softcore.
Its by Bunnie, and he great talks about the choices and why he made them:
Keynote: Precursor - Trustable Open Hardware for Everyday Use - Bunnie Huang (https://www.youtube.com/watch?v=Fw5FEuGRrLE)
They are also doing their own Rust Message passing OS called Xous that might be of interest.
https://github.com/betrusted-io/xous-core
-
C Isn't A Programming Language Anymore - Faultlore
As for privacy and safety of people, https://github.com/betrusted-io/xous-core/issues/57 way past 1.0. Imagine that. Heh.
-
Kerla: Monolithic kernel in Rust, aiming for Linux ABI compatibility
There are more good efforts, the BeTrusted guys are working on Xous, its a microkernel for a phone like device called the Precurser.
https://github.com/betrusted-io/xous-core
As a embedded service processor OS for a big server rack, Oxide Computer is working on 'HubrisOS'. They seem to have not released it yet, but that will be open sourced.
https://github.com/oxidecomputer
Those are two efforts where I know real resources are going into.
- Xous: Secure Microkernel in Rust
- xous: Secure microkernel in Rust
What are some alternatives?
hn-search - Hacker News Search
NoProto - Flexible, Fast & Compact Serialization with RPC