GuardBSD Logo



Rust Multi-Microkernel OS • Capability Security • BSD Licensed • Winter Saga Release



*** UNDER CONSTRUCTION ***




Welcome to GuardBSD Documentation

This is the official documentation for GuardBSD - a secure, capability-based, multi-microkernel operating system written entirely in Rust.

echo "Documentation is working!"

Use the sidebar to navigate through architecture, installation, APIs, internals and user guides.



Overview

GuardBSD is a modern, secure operating system built on a unique three-microkernel architecture, unlike traditional monolithic or single-microkernel designs:

  • µK-Space - memory management
  • µK-Time - scheduling & timers
  • µK-IPC - inter-process communication

Each microkernel is:

  • minimal,
  • isolated,
  • formally verifiable,
  • responsible for one strictly defined subsystem.

GuardBSD is designed for high-assurance environments, formal verification,
and multi-architecture support (x86_64 and ARM64).



Design Philosophy

Separation of Concerns

Each microkernel implements exactly one subsystem - eliminating kernel bloat and reducing bugs.

Security First

  • Capability-based security model
  • No ambient authority
  • Full revocation & delegation
  • Minimal trusted computing base

Formal Verification

Microkernels are intentionally small enough for automated proof systems.

Multi-Architecture Support

A unified Rust codebase supports identical behavior on x86_64 and ARM64, using architecture abstraction layers.



System Architecture

GuardBSD consists of:

  • Applications
  • System library (libgbsd)
  • Userland servers: Init, VFS, RAMFS, DevD, NetD
  • Drivers: Storage, serial, block devices
  • Three microkernels: µK-Space, µK-Time, µK-IPC
  • Hardware Abstraction Layer

See the detailed diagrams in Architecture Overview →



Microkernels

µK-Space (Memory)

Responsible for PMM, VMM, page tables, TLB, and address space creation.

µK-Time (Scheduler)

Implements the thread scheduler, timing subsystem, and timer interrupts.

µK-IPC (Communication)

Handles message passing, IPC ports, capability routing, and IPC syscalls.



Target Use Cases

  • Secure embedded devices
  • High-assurance systems
  • Real-time workloads
  • Virtualization environments
  • Networking appliances
  • Research & academic OS design


Recommended Next Sections

  • Architecture - high-level and full diagrams
  • Features - minimalism, security, performance
  • Status - roadmap and development progress


GuardBSD -> Secure • Fast • Modern