Most system components run in user-space on a microkernel system, a bug in a system component out of the kernel can't [crash the system/kernel].
Most system components run in user-space on a microkernel system, a bug in a non-kernel component won't [crash the system/kernel].
[crash the system/kernel]:https://en.wikipedia.org/wiki/Kernel_panic
[crash the system/kernel]:https://en.wikipedia.org/wiki/Kernel_panic
### No-reboot design
#### No-reboot design
The kernel change very little (bug fixing), then you don't need to restart your system with frequency to update the system, since most of the system components are on user-space, they can be replaced on-the-fly (it helps a lot server administrators).
Expect less kernel updates too (less chance to more bugs).
The kernel changes very little (bug fixing), so you won't need to restart your system very often to update the system.
### No need for exploit mitigations
Since most of the system components are in user-space, they can be replaced on-the-fly (reducing downtime for server administrators).
The microkernel design written in Rust makes most C/C++ security bugs irrelevant/useless, with this design the attacker can't use these bugs to exploit the system.
#### ZFS-inspired filesystem
### ZFS-inspired filesystem
Redox uses RedoxFS as the default filesystem, it supports similar features as [ZFS] with a written-in-Rust implementation.
Redox uses RedoxFS as the default filesystem, it support the same features of [ZFS] with changes on implementation.
Expect high performance and data safety (copy-on-write, data integrity, volumes, snapshots, hardened against data loss).
Expect high performance and data safety (copy-on-write, data integrity, volumes, snapshots, hardened against data loss).
### Better system performance and less memory usage
#### Easy to develop and debug
Most of the system components run on user-space, you don't need virtualization to test/debug them, more quick to develop.
### Rust benefits
#### No need for exploit mitigations
The microkernel design written in Rust protects against C/C++ memory defects, by isolating the system components from the kernel, the [attack surface] is very limited..