<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Antony Developer</title>
    <description>The latest articles on DEV Community by Antony Developer (@antony_developerrbs).</description>
    <link>https://dev.to/antony_developerrbs</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3900039%2F632d422f-3148-422f-b0d3-d87f1ca5df37.png</url>
      <title>DEV Community: Antony Developer</title>
      <link>https://dev.to/antony_developerrbs</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/antony_developerrbs"/>
    <language>en</language>
    <item>
      <title>OptimaOS: A Rust Kernel That Boots on Real x86_64 Hardware</title>
      <dc:creator>Antony Developer</dc:creator>
      <pubDate>Mon, 27 Apr 2026 08:52:26 +0000</pubDate>
      <link>https://dev.to/antony_developerrbs/optimaos-a-rust-kernel-that-boots-on-real-x8664-hardware-786</link>
      <guid>https://dev.to/antony_developerrbs/optimaos-a-rust-kernel-that-boots-on-real-x8664-hardware-786</guid>
      <description>&lt;h2&gt;
  
  
  The Problem: Fragmentation Through Forking
&lt;/h2&gt;

&lt;p&gt;Android is a Linux fork. Embedded distros are forks with custom patches per SoC. AI stacks run on separate codebases. Each fork means a separate security audit, a separate team, and its own accumulating regression debt.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The bet:&lt;/strong&gt; one kernel binary for all scenarios. Profile differences are runtime policy, not a fork of the codebase. This is locked in ADR-0002 as &lt;em&gt;Single Kernel + Runtime Profile Overlays&lt;/em&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  It Boots on Real Hardware
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;POST UEFI MODE
MM_OK  INTR_OK  SCHED_OK
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That's on real x86_64 — not QEMU.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;UEFI bootloader → kernel launches stably&lt;/li&gt;
&lt;li&gt;ExitBootServices passes cleanly&lt;/li&gt;
&lt;li&gt;Post-UEFI runtime is alive: heartbeat, progress panels, hardware tick source (SRC H)&lt;/li&gt;
&lt;li&gt;PS/2 keyboard control: P pause/resume, N single-step, R reset&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Architecture
&lt;/h2&gt;

&lt;p&gt;The split is hard:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Kernel (mechanisms) — never changes per config:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Memory manager + MMU page tables (PML4 → PDPT → PD → PT)&lt;/li&gt;
&lt;li&gt;Scheduler (processes, threads, SMP)&lt;/li&gt;
&lt;li&gt;IPC bus with typed endpoints&lt;/li&gt;
&lt;li&gt;Capability graph with quotas and TTL&lt;/li&gt;
&lt;li&gt;Syscall ABI (optima_syscall_v0)&lt;/li&gt;
&lt;li&gt;Page fault handler&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Profiles (policy) — loaded at runtime:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Policy rules: what each process is allowed to do&lt;/li&gt;
&lt;li&gt;Scheduler parameters (latency-first for desktop, throughput-first for server)&lt;/li&gt;
&lt;li&gt;Allowed syscall patterns&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;One kernel binary. On boot, a policy file loads and policy-service applies it on top. No kernel recompilation.&lt;/p&gt;




&lt;h2&gt;
  
  
  Kernel Internals
&lt;/h2&gt;

&lt;p&gt;kernel-core is a single Rust workspace crate, ~33K lines. #[forbid(unsafe_code)] is not a guideline — it's a compiler-enforced ban. All unsafe is isolated in the HAL layer (hardware/mod.rs) and explicitly annotated. Total: ~600 lines of unsafe across the entire kernel.&lt;/p&gt;

&lt;h3&gt;
  
  
  Memory
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;memory.rs — base manager: mmap/munmap/protect with PROT_READ/WRITE/EXEC&lt;/li&gt;
&lt;li&gt;mm.rs — full x86_64 page tables: PML4 → PDPT → PD → PT → 4KB page&lt;/li&gt;
&lt;li&gt;page_fault.rs — handler for interrupt vector #14, parses PageFaultErrorCode (P/W/U/RSVD/ID bits), feeds into runtime IDT&lt;/li&gt;
&lt;li&gt;Memory isolation levels per ADR-0008: Level 1 (Capability IPC) , Level 2 (MPU Regions) stub, Level 3 (MMU Page Tables) &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  IPC
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Process A ──send(endpoint_B, data)──&amp;gt; IpcBus ──enqueue──&amp;gt; Process B
                                          │
                                     capability check
                                     type check
                                     rate limit
                                     audit log
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Each endpoint has an owner PID and a message queue (VecDeque). Messages carry from_pid, payload, and a list of delegated capabilities — so capabilities can be transferred through IPC without bypassing the permission system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;QEMU baseline:&lt;/strong&gt; p50 = 900ns, p95 = 1700ns, p99 = 2500ns, throughput = 904k req/s. Under load (4 concurrent senders, 64-byte messages): less than 2x latency increase. Real hardware numbers are next.&lt;/p&gt;

&lt;p&gt;Security is not optional: capability check, type check, per-session and per-method rate limiting, audit log at trust boundaries.&lt;/p&gt;

&lt;h3&gt;
  
  
  Capabilities
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight rust"&gt;&lt;code&gt;&lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="k"&gt;struct&lt;/span&gt; &lt;span class="n"&gt;Capability&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="n"&gt;id&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;CapId&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="n"&gt;owner_pid&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nb"&gt;u64&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="n"&gt;resource&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;Resource&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;      &lt;span class="c1"&gt;// Endpoint(u64) | MemoryRegion(u64) | Process(u64)&lt;/span&gt;
    &lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="n"&gt;permission&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;Permission&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;  &lt;span class="c1"&gt;// read / write / manage&lt;/span&gt;
    &lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="n"&gt;quota&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;ResourceQuota&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="n"&gt;created_at&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nb"&gt;u64&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="n"&gt;expires_at&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nb"&gt;Option&lt;/span&gt;&lt;span class="o"&gt;&amp;lt;&lt;/span&gt;&lt;span class="nb"&gt;u64&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="c1"&gt;// TTL for temporary caps&lt;/span&gt;
    &lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="n"&gt;priority&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;QuotaPriority&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="n"&gt;violation_count&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nb"&gt;u32&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;ResourceQuota sets limits: max_memory_bytes (1 GB default), max_ipc_per_second (10K/sec), max_threads (256), max_file_handles (1024), max_capabilities (512).&lt;/p&gt;

&lt;p&gt;On quota violation — priority degrades: High → Normal → Low → Degraded. This is DoS protection at the kernel level. Temporary capabilities with TTL invalidate automatically — no permission garbage collector needed.&lt;/p&gt;

&lt;p&gt;23 tests cover all branches including boundary values and quota combinations.&lt;/p&gt;

&lt;h3&gt;
  
  
  Scheduler
&lt;/h3&gt;

&lt;p&gt;Task states: Ready / Running / Blocked / Terminated.&lt;/p&gt;

&lt;p&gt;Context switch: save registers → load CR3 (if different address space) → TLB flush → restore registers → jump to new stack.&lt;/p&gt;

&lt;p&gt;SMP support via SmpManager with PerCpuData, CpuInfo (family/model/stepping/features), and IPI: Halt, Init, Call, Resched.&lt;/p&gt;

&lt;p&gt;Scheduler policy is profile-driven: home → Interactive, server → Throughput.&lt;/p&gt;

&lt;h2&gt;
  
  
  Boot Chain: Two-Layer Architecture
&lt;/h2&gt;

&lt;p&gt;ADR-0003 defines Hybrid Staged Console Integration:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Stage A (UEFI shim):&lt;/strong&gt; transport + diagnostics only. Publishes input events, renders output frames from runtime. No business logic.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Stage B (kernel-core runtime):&lt;/strong&gt; the single point of command execution. One parser/dispatcher for both host and device.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The boundary is console_proto=v1. Breaking changes require a new major version and a new ADR.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BootData ABI v2:&lt;/strong&gt; passes the real memory map (region list), not just aggregates. Self-check handoff (SELFCHK) + error codes — state transfer verification between bootloader and kernel.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Lifecycle:&lt;/strong&gt; BootInit → ShimReady → RuntimeAttach → Interactive → Degraded&lt;/p&gt;

&lt;p&gt;On input path degradation, the system stays bootable in diagnostics-mode. Runtime state is not affected by transport-level errors.&lt;/p&gt;

&lt;h2&gt;
  
  
  Linux ABI: Incremental
&lt;/h2&gt;

&lt;p&gt;linux-compat maps Linux syscalls to optima_syscall_v0. It depends on kernel-core explicitly — the only such exception.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;L1:&lt;/strong&gt; clone, exit, nanosleep, mmap, munmap, sendmsg, recvmsg, signals (minimal), epoll (minimal)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L2-A:&lt;/strong&gt; fd lifecycle (open/close/read/write), dup/dup2, poll/epoll_wait&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L2-B:&lt;/strong&gt; signal masks, pending queue&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L2-C:&lt;/strong&gt; epoll_ctl(DEL/MOD), extended epoll semantics&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;129 tests, 100% pass. Linux bridge API is marked draft — stability will be announced separately. Each new syscall expands attack surface, so each tier closes with compatibility matrix tests.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security Architecture
&lt;/h2&gt;

&lt;p&gt;These are not feature checkboxes — they're architectural invariants.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No global root.&lt;/strong&gt; Every action requires an explicit capability with owner PID verification.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Typed IPC.&lt;/strong&gt; Wrong message type → rejected in kernel, not userspace.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Quota-based DoS protection.&lt;/strong&gt; Process exceeding limits degrades in priority — doesn't crash, doesn't block.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tamper-evident audit log.&lt;/strong&gt; Hash-chain integrity for all security events: AUTHZ_DENY, CAPABILITY_GRANT, CAPABILITY_REVOKE, IPC_AUTH_FAIL, POLICY_BYPASS_ATTEMPT, KERNEL_PANIC, SERVICE_CRASH_RECOVERY.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Post-quantum crypto (architecture):&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight rust"&gt;&lt;code&gt;&lt;span class="k"&gt;pub&lt;/span&gt; &lt;span class="k"&gt;enum&lt;/span&gt; &lt;span class="n"&gt;PqcAlgorithm&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="n"&gt;MlKem512&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;MlKem768&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;MlKem1024&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;  &lt;span class="c1"&gt;// NIST Level 1/3/5&lt;/span&gt;
    &lt;span class="n"&gt;MlDsa44&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;MlDsa65&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;MlDsa87&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;      &lt;span class="c1"&gt;// NIST Level 2/3/5&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Crypto is a userspace service. The kernel only knows about capabilities. Migrating from ECDSA to ML-KEM means updating one userspace binary — no kernel rebuild. In a monolithic kernel, that touches the kernel, lsass, protected processes, and firmware.&lt;/p&gt;

&lt;h2&gt;
  
  
  Licensing: GPL-3 + Dual License
&lt;/h2&gt;

&lt;p&gt;Initially planned as MIT/Apache. Changed to GPL-3 + commercial dual license.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why GPL-3 over MIT:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Copyleft at the kernel level works differently than in libraries. If someone takes kernel-core, modifies it, and ships it in a device — GPL-3 requires publishing changes. MIT doesn't — a vendor takes the kernel, adds patches for their SoC, and disappears into a closed branch forever.&lt;/li&gt;
&lt;li&gt;Anti-tivoization (Section 3): GPL-2 allows manufacturers to lock hardware so users can't run modified kernels on their own devices. GPL-3 prohibits this. For a project targeting Edge and IoT, this is not abstract.&lt;/li&gt;
&lt;li&gt;Explicit patent grant: distributing the code grants recipients rights to any patents that might be infringed. MIT offers no such protection.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Why a commercial license on top:&lt;/strong&gt;&lt;br&gt;
GPL-3 blocks companies that want to embed OptimaOS in a proprietary product without publishing changes. Dual licensing solves this: community gets GPL-3, commercial users pay for the right to keep changes private. Standard scheme — same as Qt, MySQL, MongoDB.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CLA for contributors:&lt;/strong&gt; dual licensing requires a single rights holder. All contributors sign a CLA: they keep their copyright but grant the project the right to relicense their code under the commercial license. Without CLA before the first external patch, dual licensing becomes legally impossible. This is locked in CONTRIBUTING.md and README.md.&lt;/p&gt;

&lt;h2&gt;
  
  
  Current Status
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Component&lt;/th&gt;
&lt;th&gt;Status&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Kernel-core (memory + MMU, scheduler, IPC, capability, syscall)&lt;/td&gt;
&lt;td&gt;Working prototype&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Home / Server profiles&lt;/td&gt;
&lt;td&gt;Done&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Linux ABI L1 + L2 (129 tests)&lt;/td&gt;
&lt;td&gt;Done&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;x86_64 page tables (PML4→PT, page fault handler)&lt;/td&gt;
&lt;td&gt;Implemented&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;xHCI USB host controller&lt;/td&gt;
&lt;td&gt;Full implementation (QEMU)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;UEFI bootloader + BootData v2 ABI&lt;/td&gt;
&lt;td&gt;Done&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Boot on real x86_64&lt;/td&gt;
&lt;td&gt;Working&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hardware interrupts (PIC/PIT/IDT, hardware ticks)&lt;/td&gt;
&lt;td&gt;Working&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Scheduler in post-UEFI hardware runtime&lt;/td&gt;
&lt;td&gt;Working&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;GUI framework (Desktop, Start Menu, File Browser)&lt;/td&gt;
&lt;td&gt;Basic implementation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Crypto-service (PQC)&lt;/td&gt;
&lt;td&gt;Stub, full architecture&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Physical security (IOMMU, MemoryZeroize)&lt;/td&gt;
&lt;td&gt;Stub, full architecture&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;On-device smoke harness (real task execution)&lt;/td&gt;
&lt;td&gt;In progress&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;847 tests, 100% pass.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;P0 performance baseline (QEMU, February 2026): IPC p95 ≤ 25 µs, context-switch p95 ≤ 35 µs, throughput ≥ 30k req/s, tail p99 ≤ 80 ms. Real hardware numbers — next milestone.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's Next
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Real task execution on hardware.&lt;/strong&gt; The scheduler demonstrates the model (TASK1…TASK4, RUN/RDY/SLP) but doesn't run real tasks yet. Next step: task execution with IPC between processes on physical hardware. This closes the on-device smoke harness.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Kernel module decomposition.&lt;/strong&gt; runtime_scheduler.rs extracted, runtime_arch.rs started. Hardware bring-up showed where boundaries were fuzzy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Linux L2 completion.&lt;/strong&gt; L2-C done, next: signalfd/eventfd. After stabilization: Android Binder IPC on optima_syscall_v0 in backlog.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Long term: Win32 L3.&lt;/strong&gt; The most complex layer, distant horizon — but the architecture is already designed for it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Global hypothesis:&lt;/strong&gt; one kernel binary running across desktop, server, and Edge without performance degradation. Real hardware boot is the first data point. Real task execution is next.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Code:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GitHub: &lt;a href="https://github.com/dev993848/optimaos" rel="noopener noreferrer"&gt;https://github.com/dev993848/optimaos&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Development, documentation, and this article were a collaboration between the author, Claude, Codex, DeepSeek, Qwen, GLM, and other AI systems.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>rust</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
