Wedson Almeida Filho is a Microsoft engineer who has been prolific in his contributions to the Rust for the Linux kernel code over the past several years. Wedson has worked on many Rust Linux kernel features and even did a experimental EXT2 file-system driver port to Rust. But he’s had enough and is now stepping away from the Rust for Linux efforts.

From Wedon’s post on the kernel mailing list:

I am retiring from the project. After almost 4 years, I find myself lacking the energy and enthusiasm I once had to respond to some of the nontechnical nonsense, so it’s best to leave it up to those who still have it in them.

I truly believe the future of kernels is with memory-safe languages. I am no visionary but if Linux doesn’t internalize this, I’m afraid some other kernel will do to it what it did to Unix.

Lastly, I’ll leave a small, 3min 30s, sample for context here: https://youtu.be/WiPp9YEBV0Q?t=1529 – and to reiterate, no one is trying force anyone else to learn Rust nor prevent refactorings of C code."

  • Daniel Quinn@lemmy.ca
    link
    fedilink
    English
    arrow-up
    121
    ·
    4 months ago

    Oof, that video… I don’t have enough patience to put up with that sort of thing either. I wonder how plausible a complete Rust fork of the kernel would be.

    • rollmagma@lemmy.world
      link
      fedilink
      arrow-up
      98
      ·
      4 months ago

      It’s always been this way. Except that it was kernel developers arguing with kernel developers over C code. Now it’s relative newcomers arguing with kernel developers over Rust code that the kernel devs don’t necessarily care about. Of course it’s going to be a mess.

      A fork is of course possible, but operating systems are huge and very complex, you really don’t want to alienate these folks that have been doing exclusively this for 30 years. It would be hard to keep the OS commercially viable with a smaller group and having to do both the day to day maintenance, plus the rewrite. It’s already difficult as it is currently.

      Rust will be a huge success in time, long after the current names have lost their impetus. This is not a “grind for 4 years and it’s done” project.

      • ramble81@lemm.ee
        link
        fedilink
        arrow-up
        18
        ·
        edit-2
        4 months ago

        folks that have been doing this exclusively for 30 years

        And yet the number of people I hear “just switch to Linux!” When the other person has been using Windows for 30 years blows my mind.

        Inertia is a hell of a drug.

        • superkret@feddit.org
          link
          fedilink
          arrow-up
          72
          ·
          4 months ago

          I wouldn’t tell a Windows developer with 30 years experience to just switch to developing for Linux.
          Users are different. Most people who have used Windows for 30 years never touch anything outside of the desktop, taskbar and Explorer.

          • Hotzilla@sopuli.xyz
            link
            fedilink
            arrow-up
            12
            ·
            4 months ago

            I have been using Windows for 30 years and Linux for 25 years (debian since 99’). I really would not bash (pun intended) windows users so much, there is place for both of them.

          • ILikeBoobies@lemmy.ca
            link
            fedilink
            arrow-up
            5
            ·
            4 months ago

            It’s insane to find a windows user that doesn’t live in the terminal, it’s just not designed for it

            Linux has a gui for everything

    • Vincent@feddit.nl
      link
      fedilink
      arrow-up
      69
      ·
      4 months ago

      That person in the audience was really grinding my gears. Just let the folks you’re talking to answer you; no need to keep going on your diatribe when it’s based on a false assumption and waste the whole room’s time.

      • moriquende@lemmy.world
        link
        fedilink
        arrow-up
        19
        ·
        4 months ago

        let’s not lose focus of what’s important here, and that is a room full of people hearing my voice and paying attention to me for as long as I manage to hold it

    • floofloof@lemmy.ca
      link
      fedilink
      English
      arrow-up
      34
      ·
      4 months ago

      I wonder how plausible a complete Rust fork of the kernel would be.

      It sounds highly impractical, and it would probably introduce more issues than Rust solves, even if there were enough people with enough free time to do it. Any change must be evolutionary if it’s going to be achievable.

    • cerement@slrpnk.net
      link
      fedilink
      arrow-up
      27
      ·
      4 months ago

      NOT a fork of Linux, but Redox is aiming for a Unix-like OS based on Rust – but even with “source compatibility” with Linux/BSD and drivers being in userspace, my guess would be hardware drivers are still going to be a big speed bump

      • merthyr1831@lemmy.ml
        link
        fedilink
        English
        arrow-up
        11
        ·
        4 months ago

        All you need nowadays for a decent Unix-like is compatibility with a handful of Linux softwares and a web browser. Hell, if you could get WINE working on your kernel you could maybe support as many Windows apps/games as Linux for free.

        The big issue, as I see it, is performant drivers for a wide range of hardware. That doesn’t come easy, but I wonder if that can be addressed in a way I’m too inexperienced to know.

        But projects like Redox are a genuine threat to the hegemony of Linux - if memory safety isn’t given the true recognition it deserves, projects like Redox serve to be the same disrupting force as Linux once was for UNIX.

    • ikidd@lemmy.world
      link
      fedilink
      English
      arrow-up
      15
      ·
      4 months ago

      Just fork and port Ext4 to Rust and let the little shit sit in his leaking kiddy pool out back.

      • ericjmorey@programming.dev
        link
        fedilink
        arrow-up
        4
        ·
        4 months ago

        It’s also a microkernel and intentional not POSIX compliant (but it’s close to compliant). I like the project, but it’s very experimental on purpose, so we should set our expectations accordingly. I’d love to see it become a success, but it may not be or it may only be successful in a smaller niche than the current Linux ecosystem.

        That said, it seems very open to new contributors. I hope more people can help it along.

    • WarmApplePieShrek@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      4
      ·
      4 months ago

      You should do it. The Linux kernel is a C project. You can’t change a 30-year project on a dime. Make your own project with Rust and hookers.

  • youmaynotknow@lemmy.ml
    link
    fedilink
    arrow-up
    109
    ·
    4 months ago

    Ted Ts’o is a prick with a god complex. I understand his experience is hard to match, we all have something in our lives we’re that good at, but that does not need to lead to acting like a fucking religious fanatic.

    • pivot_root@lemmy.world
      link
      fedilink
      arrow-up
      144
      ·
      edit-2
      4 months ago

      I understand his experience is hard to match, we all have something in our lives we’re that good at

      At some point, that mix of experience and ego becomes a significant liability. He’s directly hurting the adoption of Rust in the kernel, while the C code he’s responsible for is full of problems that would have been impossible if written in safe Rust.

      CVE-2024-42304 — crash from undocumented function parameter invariants
      CVE-2024-40955 — out of bounds read
      CVE-2024-0775 — use-after-free
      CVE-2023-2513 — use-after-free
      CVE-2023-1252 — use-after-free
      CVE-2022-1184 — use-after-free
      CVE-2020-14314 — out of bounds read
      CVE-2019-19447 — use-after-free
      CVE-2018-10879 — use-after-free
      CVE-2018-10878 — out of bounds write
      CVE-2018-10881 — out of bounds read
      CVE-2015-8324 — null pointer dereference
      CVE-2014-8086 — race condition
      CVE-2011-2493 — call function pointer in uninitialized struct
      CVE-2009-0748 — null pointer dereference

      • Flipper@feddit.org
        link
        fedilink
        arrow-up
        30
        ·
        4 months ago

        crash from undocumented function parameter invariants

        My favourite, as that was the exact point the dev was making in his talk, that the stuff is badly documented and that the function signature would document it perfectly.

        • WarmApplePieShrek@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          4 months ago

          My favorite, as that is the exact point made by anti-rust people.

          What kind of type signature would prove the first block of any directory in an ext4 filesystem image isn’t a hole?

          • pivot_root@lemmy.world
            link
            fedilink
            arrow-up
            14
            ·
            4 months ago

            The first directory block is a hole. But type == DIRENT, so no error is reported. After that, we get a directory block without ‘.’ and ‘…’ but with a valid dentry. This may cause some code that relies on dot or dotdot (such as make_indexed_dir()) to crash

            The problem isn’t that the block is a hole. It’s that the downstream function expects the directory block to contain . and .., and it gets given one without because of incorrect error handling.

            You can encode the invariant of “has dot and dot dot” using a refinement type and smart constructor. The refined type would be a directory block with a guarantee it meets that invariant, and an instance of it could only be created through a function that validates the invariant. If the invariant is met, you get the refined type. If it isn’t, you only get an error.

            This doesn’t work in C, but in languages with stricter type systems, refinement types are a huge advantage.

              • pivot_root@lemmy.world
                link
                fedilink
                arrow-up
                3
                ·
                edit-2
                4 months ago

                If it were poorly designed and used exceptions, yes. The correct way to design smart constructors is to not actually use a constructor directly but instead use a static method that forces the caller to handle both cases (or explicitly ignore the failure case). The static method would have a return type that either indicates “success and here’s the refined type” or “error and this is why.”

                In Rust terminology, that would be a Result<T, Error>.

                For Go, it would be (*RefinedType, error) (where dereferencing the first value without checking it would be at your own peril).

                C++ would look similar to Rust, but it doesn’t come as part of the standard library last I checked.

                C doesn’t have the language-level features to be able to do this. You can’t make a refined type that’s accessible as a type while also making it impossible to construct arbitrarily.

          • Preston Maness ☭@lemmygrad.ml
            link
            fedilink
            English
            arrow-up
            3
            ·
            4 months ago

            What kind of type signature would prove the first block of any directory in an ext4 filesystem image isn’t a hole?

            I don’t know if the type system proves it’s not a hole, but the type system certainly seems to force consumers to contend with the possibility by surfacing the outcomes at the type system level. That’s what the Either is doing in the example’s return type, is it not?

            fn get_or_create_inode(
                &self,
                ino: Ino
            ) -> Result<Either<ARef<Inode<T>>, inode::New<T>>>
            
    • IAmNotACat@lemmy.world
      link
      fedilink
      arrow-up
      38
      ·
      4 months ago

      Agreed. His experience might be useful if he were there to engage, but he’s clearly not. It seems like he just wanted to shout down the project and it seems like he was somewhat successful.

    • qqq@lemmy.world
      link
      fedilink
      arrow-up
      37
      ·
      edit-2
      4 months ago

      No intention of validating that behavior, it’s uncalled for and childish, but I think there is another bit of “nontechnical nonsense” on the opposite side of this silly religious war: the RIIR crowd. Longstanding C projects (sometimes even projects written in dynamic languages…?) get people that know very little about the project, or at least have never contributed, asking for it to be rewritten or refactored in Rust, and that’s likely just as tiring as the defensive C people when you want to include Rust in the kernel.

      People need to chill out on both sides of this weird religious war. A programming language is just a tool: its merits in a given situation should be discussed logically.

      • JackbyDev@programming.dev
        link
        fedilink
        English
        arrow-up
        12
        ·
        4 months ago

        I imagine this mentality is frustrating because of how many times they have to explain that they weren’t forcing people to learn Rust and that the Rust bindings were second class citizens. They never said to rewrite the kernel in Rust.

        • wewbull@feddit.uk
          link
          fedilink
          English
          arrow-up
          12
          ·
          4 months ago

          That’s disengenuous though.

          • We’re not forcing you to learn rust. We’ll just place code in your security critical project in a language you don’t know.

          • Rust is a second class citizen, but we feel rust is the superior language and all code should eventually benefit from it’s memory safety.

          • We’re not suggesting that code needs to be rewritten in rust, but the Linux kernel development must internalise the need for memory safe languages.

          No other language community does what the rust community does. Haskellers don’t go to the Emacs project and say “We’d like to write Emacs modules, but we think Haskell is a much nicer and safer functional language than Lisp, so how about we add the capability of using Haskell and Lisp?”. Pythonistas didn’t add Python support to Rails along side Ruby.

          Rusties seem to want to convert everyone by Trojan horsing their way into communities. It’s extremely damaging, both to those communities and to rust itself.

          • CancerMancer@sh.itjust.works
            link
            fedilink
            arrow-up
            4
            ·
            4 months ago

            It doesn’t help that the Rust community tends to bring extremely divisive politics with it in places and ways that just don’t need to happen, starting battles that aren’t even tangentially related to programming.

      • youmaynotknow@lemmy.ml
        link
        fedilink
        arrow-up
        24
        ·
        4 months ago

        He’s the guy you hear vexing rust in the video posted. While both languages have their pros and cons, he chooses to just blast this other guy by repeating the same crap over and over without letting him reply. Basically the kind of person with a “I win because I’m louder” demeanor.

  • Findmysec@infosec.pub
    link
    fedilink
    English
    arrow-up
    83
    ·
    4 months ago

    Who the fuck is this little shit? Can’t they even be a little considerate towards rust? Just because they have 15 years worth of inertia for C doesn’t mean they can close their eyes and say “nope, I’m not interested”. I do not see how the kernel can survive without making rust a first class citizen

  • antihumanitarian@lemmy.world
    link
    fedilink
    English
    arrow-up
    67
    ·
    4 months ago

    The comments from that article are some of the most vitriolic I’ve ever seen on a technical issue. Goes to prove the maintainer’s point though.

    Some are good for a laugh though, like assertions that Rust in the kernel is a Microsoft sabotage op or LLVM is for grifters and thieves.

  • 0x0@programming.dev
    link
    fedilink
    arrow-up
    67
    ·
    edit-2
    4 months ago

    The kernel is mostly written in C, by C developers… understandably they’re rather refactor C code to make it better instead of rewritting everything in the current fancy language that’ll save the world this time (especially considering proponents of said language always, at every chance they get, sell it as C is crap, this is better).

    Linux is over 30yo and keeps getting better and more stable, that’s the power of open-source.

    • Vincent@feddit.nl
      link
      fedilink
      arrow-up
      135
      ·
      4 months ago

      This sounds exactly like the type of nontechnical nonsense they’re complaining about: attacking a strawman (“they’re trying to prevent people from refactoring C code and making them rewrite everything in the current fancy language”) even after explicitly calling out that that was not going to happen (“and to reiterate, no one is trying force anyone else to learn Rust nor prevent refactorings of C code”).

    • troed@fedia.io
      link
      fedilink
      arrow-up
      50
      ·
      4 months ago

      C is crap for anything where security matters. I’ll happily take that debate with anyone who thinks differently.

      • fartsparkles@sh.itjust.works
        link
        fedilink
        arrow-up
        49
        ·
        edit-2
        4 months ago

        No idea what you’re being downvoted. Just take a look at all the critical CVSS scored vulnerabilities in the Linux kernel over the past decade. They’re all overwhelmingly due to pitfalls of the C language - they’re rarely architectural issues but instead because some extra fluff wasn’t added to double check the size of an int or a struct etc resulting in memory corruption. Use after frees, out of bounds reads, etc.

        These are pretty much wiped out entirely by Rust and caught at compile time (or at runtime with a panic).

        The cognitive load of writing safe C, and the volume of extra code it requires, is the problem of C.

        You can write safe C, if you know what you’re doing (but as shown by the volume of vulns, even the world’s best C programmers still make slip ups).

        Rust forces safe® code without any of the cognitive load of C and without having to go out of your way to learn it and religiously implement it.

        • qqq@lemmy.world
          link
          fedilink
          arrow-up
          24
          ·
          edit-2
          4 months ago

          They’re being downvoted because it’s a silly comment that is basically unrelated and also extremely unhelpful. Everyone can agree that C has footguns and isn’t memory safe, but writing a kernel isn’t memory safe. A kernel written in Rust will have tons of unsafe, just look at Redox: https://github.com/search?q=repo%3Aredox-os%2Fkernel unsafe&type=code That doesn’t mean it isn’t safer, even in kernel space, but the issues with introducing Rust into the kernel, which is already written in C and a massive project, are more nuanced than “C bad”. The religious “C bad” and “C good” arguments are kinda exactly the issue on display in the OP.

          I say this as someone who writes mostly Rust instead of C and is in favor of Rust in the kernel.

          • witx@lemmy.sdf.org
            link
            fedilink
            arrow-up
            8
            ·
            4 months ago

            The difference is that now you have a scope of where the memory unsafe code might be(unsafe keyword) and you look there instead of all the C code.

            • qqq@lemmy.world
              link
              fedilink
              arrow-up
              3
              ·
              edit-2
              4 months ago

              I agree and think that should be helpful, but I hesitate to say how much easier that actually makes writing sound unsafe code. I’d think most experienced C developers also implicitly know when they’re doing unsafe things, with or without an unsafe block in the language – although I think the explicit unsafe should likely help code reviewers and tired developers.

              It is possible to write highly unsafe code in Rust while each individual unsafe block appears sound. As a simple example: https://play.rust-lang.org/?version=stable&mode=debug&edition=2021&gist=6a1428d9cae5b9343b464709573648b4 [1] Run that on Debug and Release builds. Notice the output is different? Don’t take that example as some sort of difficult case, you wouldn’t write this code, but the concepts in it are a bit worrisome. That code is a silly example, but each individual unsafe block appears sound when trying to reason only within the block. There is unsafe behavior happening outside of the unsafe blocks (the do_some_things function should raise eyebrows), and the function we ultimately end up in has no idea something unsafe has happened.

              Unsafe code in Rust is not easy, and to some extent it breaks abstractions (maybe pointers in general break abstractions to some extent?). noaliases in that playground code rightly assumes you can’t have a &ref and &mut ref to the same thing, that’s undefined behavior in Rust. Yet to understand the cause of that bug you have to look at all function calls on the way, just as you would have to in C, and one of the biggest issues in the code exists outside of an unsafe block.

              [1]: If you don’t want to click that link or it breaks, here is the code:

              fn uhoh() {
                  let val = 9;
                  let val_ptr: *const usize = &val;
                  do_some_things(val_ptr);
                  println!("{}", val);
              }
              
              fn do_some_things(val: *const usize) {
                  let valref = unsafe { val.as_ref().unwrap() };
                  let mut_ptr: *mut usize = val as *mut usize;
                  do_some_other_things(mut_ptr, valref);
              }
              
              fn do_some_other_things(val: *mut usize, normalref: &usize) {
                  let mutref = unsafe { val.as_mut().unwrap() };
                  noaliases(normalref, mutref);
              }
              
              fn noaliases(input: &usize, output: &mut usize) {
                  if *input < 10 {
                      *output = 15;
                  }
                  if *input > 10 {
                      *output = 5;
                  }
              }
              
              fn main() {
                  uhoh();
              }
              
        • 0x0@programming.dev
          link
          fedilink
          arrow-up
          11
          ·
          4 months ago

          The cognitive load of writing safe C, and the volume of extra code it requires, is the problem of C.

          Oh no, i’m having a meltdown with all the cognitive load…

          Build all the fancy tools you want. At the end of the day if you put a monkey at the wheel of a Ferrari you’ll still have problems.

          Nice that Rust is memory-safe, use it if you want, but why the insistence on selling Rust via C is crap? Doesn’t earn you any points.

          How about rustaceans fork the kernel and once it’s fully Rust-only then try and get it to be used instead of the current one… win-win, eh?

          • fartsparkles@sh.itjust.works
            link
            fedilink
            arrow-up
            38
            ·
            4 months ago

            I’m not insisting anything; stating C is not a memory-safe language isn’t a subjective opinion.

            Note I’m not even a Rust fan; I still prefer C because it’s what I know. But the kernel isn’t written by a bunch of Lewis Hamiltons; so many patches are from one-time contributors and the kernel continues to get inundated with memory safety bugs that no amount of infrastructure, testing, code review, etc is catching. Linux is written by monkeys with a few Hamiltons doing their best to review everything before merging.

            Linus has talked about this repeatedly over the past few years at numerous conferences and there’s a reason he’s integrating Rust drivers and subsystems (and not asking them to fork as you are suggesting) to stop the kernel stagnating and to begin to address the issues like one-off patches that aren’t maintained by their original author and to start squashing the volume of memory corruption bugs that are causing 2/3rds of the kernel’s vulnerabilities.

            • 0x0@programming.dev
              link
              fedilink
              arrow-up
              2
              ·
              4 months ago

              the kernel continues to get inundated with memory safety bugs that no amount of infrastructure, testing, code review, etc is catching.

              I’d say this is the issue to fix. It’s not easy but if anything curl has proven it can be done efficiently.

              • troed@fedia.io
                link
                fedilink
                arrow-up
                36
                ·
                4 months ago

                Yeah, let’s see what Bagder has to say about this:

                C is unsafe and always will be

                The C programming language is not memory-safe. Among the 150 reported curl CVEs, we have determined that 61 of them are “C mistakes”. Problems that most likely would not have happened had we used a memory-safe language. 40.6% of the vulnerabilities in curl reported so far could have been avoided by using another language.

                Rust is virtually the only memory-safe language that is starting to become viable.

                https://daniel.haxx.se/blog/2023/12/13/making-it-harder-to-do-wrong/

                • MotoAsh@lemmy.world
                  link
                  fedilink
                  arrow-up
                  5
                  ·
                  edit-2
                  4 months ago

                  Memory safe language that’s becoming viable … as a proper replacement of C.

                  There are many other memory safe languages out there. Just not ones most would like to pull in to the kernel…

          • Auli@lemmy.ca
            link
            fedilink
            English
            arrow-up
            20
            ·
            4 months ago

            Yes a monkey. All the vulnerabilities that have happened over the decades are just bad c programmers. So the question is are there any good c programmers?

            • ulterno@lemmy.kde.social
              link
              fedilink
              English
              arrow-up
              0
              ·
              4 months ago

              It’s not just about bad/good C programmers. It’s also about how much of the context, the given C programmer has read to make sure they know enough of what they are doing.

              No matter how good one is at Programming, they need to make sure to read and remember what is happening in relevant parts of code, while making their one off contribution.

              That’s where the part of “leaving it to the computer” comes in. Hence, the usefulness of code checkers and even better if the compiler itself enforces the stuff. As long as the rules are good enough.

              Let’s just hope we are not jumping to another language 20 years down the line.

              Anti Commercial-AI license

          • JackbyDev@programming.dev
            link
            fedilink
            English
            arrow-up
            4
            ·
            4 months ago

            At the end of the day if you put a monkey at the wheel of a Ferrari you’ll still have problems.

            My eyes are rolling onto the floor and down the stairs.

          • ulterno@lemmy.kde.social
            link
            fedilink
            English
            arrow-up
            2
            ·
            4 months ago

            I honestly like the cognitive load. Just not when I am at the workplace, having to deal with said load, with the office banter in the background and (not so) occasionally, being interrupted for other stuff.
            And my cognitive load is not even about the memory allocations, most of the time.

            Off topic:

            I think, if one is seriously learning programming from a young age, it is better to start with C, make a project, big enough to feel the difficulty and understand what the cognitive load is all about and get used to it, hence increasing their mental capability. Then learn the memory safe language of their choice.
            I never made a big enough project in C, but you can get to feel the load in C++ too.

        • corsicanguppy@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          having to go out of your way to learn it and religiously implement it.

          Look! I painted the mona lisa in ketchup.

      • pooberbee (they/she)@lemmy.ml
        link
        fedilink
        arrow-up
        25
        ·
        4 months ago

        I think most people would agree with you, but that isn’t really the issue. Rather the question is where the threshold for rewriting in Rust vs maintaining in C lies. Rewriting in any language is costly and error-prone, so at what point do the benefits outweigh that cost and risk? For a legacy, battle-tested codebase (possibly one of the most widely tested codebases out there), the benefit is probably on the lower side.

          • pooberbee (they/she)@lemmy.ml
            link
            fedilink
            arrow-up
            5
            ·
            4 months ago

            Hmm… I admit I didn’t follow the video and who was speaking very well and didn’t notice hostility that others seem to pick up on. I’ve worked with plenty of people who turn childish when a technical discussion doesn’t go their way, and I’ve had the luxury of mostly ignoring them, I guess.

            It sounded like he was asking for deeper specification than others were willing or able to provide. That’s a constant stalemate in software development. He’s right to push for better specs, but if there aren’t any then they have to work with what they’ve got.

            My first response here was responding to the direct comparison of languages, which is kind of apples and oranges in this context, and I guess the languages involved aren’t even really the issue.

            • pivot_root@lemmy.world
              link
              fedilink
              arrow-up
              11
              ·
              edit-2
              4 months ago

              Part of the hostility was the other maintainer misunderstanding the presenter, going on a diatribe about how the kernel Rust maintainers are going to force the C code to become unrefactorable and stagnate, and rudely interrupting the presenter with another tangent whenever he (the presenter) tried to clarify anything.

              An unpleasant mix of DM railroading and gish galloping, essentially.

              I wouldn’t quite call it a strawman, but the guy was clearly not engaging in good faith. He made up hypothetical scenarios that nobody asked about, and then denigrated Rust by attacking the scenarios he came up with.

              Edit: I was thinking of the wrong fallacy. It is a strawman, yes.

              • ericjmorey@programming.dev
                link
                fedilink
                arrow-up
                5
                ·
                4 months ago

                He made up hypothetical scenarios that nobody asked about, and then denigrated Rust by attacking the scenarios he came up with.

                This seems to be the textbook description of a strawman argument.

        • Liz@midwest.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          4 months ago

          Seeing as how 40% of the security issues that have been found over the years wouldn’t exist in a memory-safe language, I would say a re-write is extremely worth it.

        • troed@fedia.io
          link
          fedilink
          arrow-up
          16
          ·
          4 months ago

          Agree. I’m an absolutely awesome software dev myself - and I know C by heart (being my favorite language after assembler). However, with age comes humility and the ability to recognize that I will write buggy code every now and then.

          Better the language saves me when I can’t, in security critical situations.

          • ulterno@lemmy.kde.social
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 months ago

            Even if you manage to keep all memory accesses in your memory, while writing the code, there’s a good chance you’ll forget something when reviewing another person’s MR. That’s probably the main problem creator.

            Still, a language that you are familiar with, is better than a new language that you haven’t finished reading the specifications of. And considering that adding new maintainers comes with a major effort of verifying trustworthiness, I get how it would be harder to switch.

        • cerement@slrpnk.net
          link
          fedilink
          arrow-up
          7
          ·
          4 months ago

          such a weird dichotomy in Windows – secure kernel space and privacy-nightmare user space … “we’re the only ones allowed to steal your data”

        • troed@fedia.io
          link
          fedilink
          arrow-up
          9
          ·
          4 months ago

          Do you believe C isn’t crap when it comes to security? Please explain why and I’ll happily debate you.

          /fw hacker, reverse engineer

          • 🦄🦄🦄@feddit.org
            link
            fedilink
            Deutsch
            arrow-up
            6
            ·
            4 months ago

            That’s not how it works. You said:

            C is crap for anything where security matters.

            Argue for your point.

                • troed@fedia.io
                  link
                  fedilink
                  arrow-up
                  10
                  ·
                  4 months ago

                  Citing scientific research is. Now, please post your gut feeling in response.

              • zaphod@sopuli.xyz
                link
                fedilink
                arrow-up
                4
                ·
                4 months ago

                Lots of categories which Rust doesn’t prevent, and in the kernel you’ll end up with a lot of unsafe Rust, so it can’t guarantee memory-safety in all cases.

                • loudwhisper@infosec.pub
                  link
                  fedilink
                  arrow-up
                  5
                  ·
                  4 months ago

                  The biggest items on the graph are all out of bounds accesses, use-after-free and overflows. It is undeniable that memory safe languages help reducing vulnerabilities, we know for decades that memory corruption vulnerabilities are both the most common and the most severe in programs written in memory-unsafe languages.

                  Unsafe rust is also not turning off every safety feature, and it’s much better to have clear highlighted and isolated parts of code that are unsafe, which can be more easily reviewed and tested, compared to everything suffering from those problems.

                  I don’t think there is debate here, rewriting is a huge effort, but the fact that using C is prone to memory corruption vulnerabilities and memory-safe languages are better from that regard is a fact.

      • unexposedhazard@discuss.tchncs.de
        link
        fedilink
        arrow-up
        14
        ·
        4 months ago

        Maybe when you build some little application or whatever. When building the most used kernel in the world, there are probably some considerations that very few people can even try to understand.

      • corsicanguppy@lemmy.ca
        link
        fedilink
        English
        arrow-up
        8
        ·
        4 months ago

        C is crap for anything where security matters.

        True for people misusing it. If you want to argue the ease of mis-use, it’s a fun talk.

        • MotoAsh@lemmy.world
          link
          fedilink
          arrow-up
          10
          ·
          edit-2
          4 months ago

          Yea, it’s not C that is crap, but that it has zero guard rails. Like blaming a knife for not having a guard… Is it a bad knife without a guard? Depends on how sharp it is. The guard is orthogonal to the knife’s purpose, but might still be important when the knife is used.

          Just because something doesn’t help prevent accidents does not mean it cannot serve its actual purpose well, unless its actual purpose is safety.

    • witx@lemmy.sdf.org
      link
      fedilink
      arrow-up
      20
      ·
      4 months ago

      Better in what ways? Rust’s strong points are not to just make a program more stable, but more secure from a memory standpoint and I don’t think Linux keeps improving on that

    • sexual_tomato@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      10
      ·
      4 months ago

      From other discussions I’ve seen, the guy stepping down was frustrated by having C code rejected that made lifetime guarantees more explicit. No rust involved. The patch was in service of rust bindings, but there was 0 rust code being reviewed by maintainers.

    • corsicanguppy@lemmy.ca
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      4 months ago

      at every chance they get, sell it as C is crap, this is better

      For ‘sendmail’ values of $C, this resembles another argument. Also, of course for $C=sysvinit.

    • Wooki@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      4 months ago

      Some next level deaf going on. That’s not what was being discussed.

      The defensiveness proves just how out of touch and unqualified to comment some people are.

  • JackbyDev@programming.dev
    link
    fedilink
    English
    arrow-up
    57
    ·
    4 months ago

    This is a little off topic and admittedly an oversimplification, but people saying Rust’s memory safety isn’t a big deal remind me of people saying static typing isn’t a big deal.

  • merthyr1831@lemmy.ml
    link
    fedilink
    English
    arrow-up
    49
    ·
    4 months ago

    The video attached is a perfect example of the kind of “I’m not prepared to learn anything new so everyone else is wrong” attitude that is eating away at Linux like a cancer.

    If memory safety isn’t adopted into the kernel, and C fanaticism discarded, Linux will face the same fate as the kernels it once replaced. Does the Linux foundation want to drag its heels and stuff millions into AI ventures whilst sysadmins quietly shift to new kernels that offer memory safety, or does it want to be part of that future?

    • WarmApplePieShrek@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      22
      ·
      4 months ago

      If Linux gets rewritten in Rust it will be a new kernel, not Linux. You can make new kernels, even in Rust but they aren’t Linux. You can advertise them at Linux conferences but you can’t force every Linux dev to work on your new Rust kernel.

      • PotatoesFall@discuss.tchncs.de
        link
        fedilink
        arrow-up
        43
        ·
        4 months ago

        There is no “your” new rust kernel. There is a gigantic ship of Theseus that is the Linux kernel, and many parts of it are being rewritten, refactored, removed an added all the time by god knows how many different people. Some of those things will be done in rust.

        Can we stop reacting to this the way conservatives react to gay people? Just let some rust exist. Nobody is forcing everyone to be gay, and nobody is forcing everybody to immediately abandon C and rewrite everything in rust.

      • witx@lemmy.sdf.org
        link
        fedilink
        arrow-up
        38
        ·
        4 months ago

        Isn’t Linux still Linux even though probably a lot of the original code is gone? Why would slowly rewriting it whole, or just parts, in Rust make it stop being Linux?

      • merthyr1831@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        the crew on the Ship of Theseus would like a word with you. Because if you strip out every subsystem and replace them with a different language, everyone would still call it Linux and it would still work as Linux.

        Linux isn’t “a bunch of C code” it’s an API, an ABI, and a bunch of drivers bundled into a monorepo.

    • Vilian@lemmy.ca
      link
      fedilink
      arrow-up
      19
      ·
      4 months ago

      Phoronix comments were always dumb, like, infuriating bad, I don’t even read them anymore, the moderation on that site don’t give a fuck about toxicity in there

      • Vivendi@lemmy.zip
        link
        fedilink
        arrow-up
        6
        ·
        4 months ago

        Avis/Bridei/Artem has been active as a super troll on that forum for years and absolutely nothing had been done

      • vividspecter@lemm.ee
        link
        fedilink
        arrow-up
        4
        ·
        4 months ago

        Beyond moderation, Phoronix is a case study in why downvotes are a good thing. Those idiots going on dumb tangents would continue, while the rest of us can read the actual worthwhile comments (which does happen, given AMD employees and the like comment there sometimes).

      • Chaotic Entropy@feddit.uk
        link
        fedilink
        English
        arrow-up
        3
        ·
        4 months ago

        I’ve asked one question, one time in those comments and it just got buried in people spitting venom at each other about their file system preferences.

    • morrowind@lemmy.ml
      link
      fedilink
      arrow-up
      17
      ·
      4 months ago

      Phoronix comments are a special place on the internet. Don’t go there for a good discussion.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        I once started reading the comments on bcachefs. It was a extremely heated for no reason. People were screaming on the nature of btrfs

  • Caveman@lemmy.world
    link
    fedilink
    arrow-up
    36
    ·
    4 months ago

    There’s always going to be pushback on new ideas. He’s basically asking people questions like “Hey how does your thing work? I want to write it in rust.” and gets the answer “I’m not going to learn rust.”.

    I think rust is generally a good thing and with a good amount of tests to enforce behavior it’s possible to a functionally equivalent copy of the current code with no memory issues in future maintenance of it. Rewriting things in rust will also force people to clarify the behavior and all possible theoretical paths a software can take.

    I’m not gonna lie though, if I would have worked on software for 20 years and people would introduce component that’s written in another language my first reaction would be “this feels like a bad idea and doesn’t seem necessary”.

    I really hope that the kernel starts taking rust seriously, it’s a great tool and I think it’s way easier to write correct code in rust than C. C is simple but lacks the guardrails of modern languages which rust has.

    The process of moving to rust is happening but it’s going to take a really long time. It’s a timescale current maintainers don’t really need to worry about since they’ll be retired anyway.

      • apt_install_coffee@lemmy.ml
        link
        fedilink
        arrow-up
        16
        ·
        edit-2
        4 months ago

        For the same reason spoken languages often have semantic structures that make a literal translation often cumbersome and incorrect, translating nontrivial code from one language into another without being a near expert in both langauges, as well as being an expert in the project in question, can lead to differences in behaviour varying from “it crashes and takes down the OS with it”, to “it performs worse”.

        • MattMatt@lemmy.world
          link
          fedilink
          English
          arrow-up
          14
          ·
          4 months ago

          I’ll add that even when you’re an expert in both languages, it’s common to see WTF’s in the original and not be sure if something is a bug or just weird behavior that’s now expected. Especially when going from a looser to a more strict language.

          I’ve translated huge projects and most of the risk is in “you know the original would do the wrong thing in these x circumstances – I’m pretty sure that’s not on purpose but… Maybe? Or maybe now someone depends on it being wrong like this?”

          • Caveman@lemmy.world
            link
            fedilink
            arrow-up
            4
            ·
            4 months ago

            Also, even if you think it’s a bug it might be a feature that other people use and “fixing” changing it might break systems.

    • root@precious.net
      link
      fedilink
      arrow-up
      3
      ·
      4 months ago

      From a developer standpoint you’re taking someone’s baby, cloning it into a language they don’t understand and deprecating the original. Worse, if you’re not actually interested in taking over the project you’ve now made it abandonware because the original developer lost heart and the person looking for commit counts on GitHub has moved on.

      Obviously these extremes don’t always apply, but a lot of open source relies on people taking a personal interest. If you destroy that, you might just destroy the project.

  • Ginny [they/she]@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    29
    ·
    4 months ago

    I am no visionary but if Linux doesn’t internalize this, I’m afraid some other kernel will do to it what it did to Unix.

    Maybe that’s not a bad thing? If you ask me the GNU people are missing a trick. Perhaps if they rewrote Hurd in Rust they could finally shed that “/Linux”.

    • fluxx@lemmy.world
      link
      fedilink
      arrow-up
      20
      ·
      4 months ago

      Well, I’ve been a C/C++ dev for half of my career, I didn’t find Rust syntax ugly. Some things are better than others, but not a major departure from C/C++. ObjC is where ugly is at. And I even think swift is more ugly. In fact, I can’t find too many that are as close to C/C++ as Rust. As for logic… Well, I want to say you’ll get used to it, but for some things, it’s not true. Rust is a struggle. Whether it’s worth it, is your choice. I personally would take it over C++ any day.

    • OrekiWoof@lemmy.ml
      link
      fedilink
      arrow-up
      16
      ·
      4 months ago

      I just don’t understand this. You get used to the syntax and borrow checker in a day or two. It’s a non-issue.

      • thevoidzero@lemmy.world
        link
        fedilink
        arrow-up
        12
        ·
        4 months ago

        I wouldn’t say that. For primitives yeah, day or two. But if you want to build a proper program, it’ll take time to get used to it. For my first few projects I just used clone everywhere. Passing by reference and managing lifetimes, specially when writing libraries is something that takes time to get used to. I still don’t feel confident.

        Besides that I do like Rust though. Sometimes I feel like “just let me do that, C let’s me”, but I know it’s just adding safety where C wouldn’t care.

      • pivot_root@lemmy.world
        link
        fedilink
        arrow-up
        9
        ·
        4 months ago

        Unless you’re a functional programming purist or coming from a systems programming background, it takes a lot longer than a few days to get used to the borrow checker. If you’re coming as someone who most often uses garbage-collected languages, it’s even worse.

        The problem isn’t so much understanding what the compiler is bitching about, as it is understanding why the paradigm you used isn’t safe and learning how to structure your code differently. That part takes the longest and only really starts to become easier when you learn to stop fighting the language.

        • OrekiWoof@lemmy.ml
          link
          fedilink
          arrow-up
          4
          ·
          4 months ago

          I see that my previous comment is not the common reality apparently.

          I’m mainly a C# + js dev of a few years, and I would love to see what precisely other people here are having problems with, because I’ve had a completely different experience to most of the people replying.

      • Preston Maness ☭@lemmygrad.ml
        link
        fedilink
        English
        arrow-up
        8
        ·
        edit-2
        4 months ago

        You get used to the syntax and borrow checker in a day or two.

        As someone who spent a couple months learning rust, this was half true for me. The syntax? Yeah. No problem. The borrow-checker (and Rust’s concept of ownership and lifetimes in general)? Absolutely not. That was entirely new territory for me.

          • Preston Maness ☭@lemmygrad.ml
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            4 months ago

            I’ll try :) Looks like I still have my code from when I was grinding through The Book, and there’s a couple spots that might be illuminating from a pedagogical standpoint. That being said, I’m sure my thought process, and “what was active code and what was commented out and when,” will probably be hard to follow.

            My first confusion was in deref coercion auto dereferencing (edit: see? it’s still probably not 100% in my head :P), and my confusion pretty much matched this StackOverflow entry:

            https://stackoverflow.com/questions/28519997/what-are-rusts-exact-auto-dereferencing-rules

            It took me until Chapter 15 of The Book (on Boxes) to really get a feel for what was happening. My work and comments for Chapter 15:

            use crate::List::{Cons, Nil};
            use std::ops::Deref;
            
            enum List {
                Cons(i32, Box<List>),
                Nil,
            }
            
            struct MyBox<T>(T);
            
            impl<T> Deref for MyBox<T> {
                type Target = T;
                fn deref(&self) -> &Self::Target {
                    &self.0
                }
            }
            
            impl<T> MyBox<T> {
                fn new(x: T) -> MyBox<T> {
                    MyBox(x)
                }
            }
            
            #[derive(Debug)]
            struct CustomSmartPointer {
                data: String,
            }
            
            impl Drop for CustomSmartPointer {
                fn drop(&mut self) {
                    println!("Dropping CustomSmartPointer with data `{}`!", self.data);
                }
            }
            
            fn main() {
                let b = Box::new(5);
                println!("b = {}", b);
            
                let _list = Cons(1, Box::new(Cons(2, Box::new(Cons(3,Box::new(Nil))))));
            
                let x = 5;
                let y = MyBox::new(x);
            
                assert_eq!(5,x);
                assert_eq!(5, *y);
            
                let m = MyBox::new(String::from("Rust"));
                hello(&m);
                hello(m.deref());
                hello(m.deref().deref());
                hello(&(*m)[..]);
                hello(&(m.deref())[..]);
                hello(&(*(m.deref()))[..]);
                hello(&(*(m.deref())));
                hello((*(m.deref())).deref());
            
                // so many equivalent ways. I think I'm understanding what happens
                // at various stages though, and why deref coercion was added to
                // the language. Would cut down on arguing over which of these myriad
                // cases is "idomatic." Instead, let the compiler figure out if there's
                // a path to the desired end state (&str).
            
                // drop stuff below ...
                let _c = CustomSmartPointer {
                    data: String::from("my stuff"),
                };
                let _d = CustomSmartPointer {
                    data: String::from("other stuff"),
                };
            
                println!("CustomSmartPointers created.");
                drop(_c);
                println!("CustomSmartPointer dropped before the end of main.");
            
                // this should fail.
                //println!("{:?}", _c);
                // yep, it does.
            
            }
            
            fn hello(name: &str) {
                println!("Hello, {name}!");
            }
            

            Another thing that ended up biting me in the ass was Non-Lexical Lifetimes (NLLs). My code from Chapter 8 (on HashMaps):

            use std::collections::HashMap;
            
            fn print_type_of<T>(_: &T) {
                println!("{}", std::any::type_name::<T>())
            }
            
            fn main() {
                let mut scores = HashMap::new();
                scores.insert(String::from("Red"), 10);
                scores.insert(String::from("Blue"), 20);
            
                let score1 = scores.get(&String::from("Blue")).unwrap_or(&0);
                println!("score for blue is {score1}");
                print_type_of(&score1); //&i32
                let score2 = scores.get(&String::from("Blue")).copied().unwrap_or(0);
                println!("score for blue is {score2}");
                print_type_of(&score2); //i32
            
                // hmmm... I'm thinking score1 is a "borrow" of memory "owned" by the
                // hashmap. What if we modify the blue teams score now? My gut tells
                // me the compiler would complain, since `score1` is no longer what
                // we thought it was. But would touching the score of Red in the hash
                // map still be valid? Let's find out.
            
                // Yep! The below two lines barf!
                //scores.insert(String::from("Blue"),15);
                //println!("score for blue is {score1}");
            
                // But can we fiddle with red independently?
                // Nope. Not valid. So... the ownership must be on the HashMap as a whole,
                // not pieces of its memory. I wonder if there's a way to make ownership
                // more piecemeal than that.
                //scores.insert(String::from("Red"),25);
                //println!("score for blue is {score1}");
            
                // And what if we pass in references/borrows for the value?
                let mut refscores = HashMap::new();
                let mut red_score:u32 = 11;
                let mut blue_score:u32 = 21;
                let default:u32 = 0;
                refscores.insert(String::from("red"),&red_score);
                refscores.insert(String::from("blue"),&blue_score);
            
                let refscore1 = refscores.get(&String::from("red")).copied().unwrap_or(&default);
                println!("refscore1 is {refscore1}");
            
                // and then update the underlying value?
                // Yep. This barfs, as expected. Can't mutate red_score because it's
                // borrowed inside the HashMap.
                //red_score = 12;
                //println!("refscore1 is {refscore1}");
            
                // what if we have mutable refs/borrows though? is that allowed?
                let mut mutrefscores = HashMap::new();
                let mut yellow_score:u32 = 12;
                let mut green_score:u32 = 22;
                let mut default2:u32 = 0;
                mutrefscores.insert(String::from("yellow"),&mut yellow_score);
                mutrefscores.insert(String::from("green"),&mut green_score);
                //println!("{:?}", mutrefscores);
            
                let mutrefscore1 = mutrefscores.get(&String::from("yellow")).unwrap();//.unwrap_or(&&default2);
                //println!("{:?}",mutrefscore1);
                
                println!("mutrefscore1 is {mutrefscore1}");
            
                // so it's allowed. But do we have the same "can't mutate in two places"
                // rule? I think so. Let's find out.
            
                // yep. same failure as before. makes sense.
                //yellow_score = 13;
                //println!("mutrefscore1 is {mutrefscore1}");
            
                // updating entries...
                let mut update = HashMap::new();
                update.insert(String::from("blue"),10);
                //let redscore = update.entry(String::from("red")).or_insert(50);
                update.entry(String::from("red")).or_insert(50);
                //let bluescore = update.entry(String::from("blue")).or_insert(12);
                update.entry(String::from("blue")).or_insert(12);
            
            
                //println!("redscore is {redscore}");
                //println!("bluescore is {bluescore}");
                println!("{:?}",update);
            
                // hmmm.... so we can iterate one by one and do the redscore/bluescore
                // dance, but not in the same scope I guess.
                let mut updatesingle = HashMap::new();
                updatesingle.insert(String::from("blue"),10);
                for i in "blue red".split_whitespace() {
                    let score = updatesingle.entry(String::from(i)).or_insert(99);
                    println!("score is {score}");
                }
            
                // update based on contents
                let lolwut = "hello world wonderful world";
                let mut lolmap = HashMap::new();
                for word in lolwut.split_whitespace() {
                    let entry = lolmap.entry(word).or_insert(0);
                    *entry += 1;
                }
            
                println!("{:?}",lolmap);
            
                // it seems like you can only borrow the HashMap as a whole.
                // let's try updating entries outside the context of a forloop.
            
                let mut test = HashMap::new();
                test.insert(String::from("hello"),0);
                test.insert(String::from("world"),0);
                let hello = test.entry(String::from("hello")).or_insert(0);
                *hello += 1;
                let world = test.entry(String::from("world")).or_insert(0);
                *world += 1;
            
                println!("{:?}",test);
            
                // huh? Why does this work? I'm borrowing two sections of the hashmap like before in the update
                // section.
                
                // what if i print the actual hello or world...
                // nope. barfs still.
                //println!("hello is {hello}");
            
                // I *think* what is happening here has to do with lifetimes. E.g.,
                // when I introduce the println macro for hello variable, the lifetime
                // gets extended and "crosses over" the second borrow, violating the
                // borrow checker rules. But, if there is no println macro for the hello
                // variable, then the lifetime for each test.entry is just the line it
                // happens on.
                //
                // Yeah. Looks like it has to do with Non-Lexical Lifetimes (NLLs), a
                // feature since 2018. I've been thinking of lifetimes as lexical this
                // whole time. And before 2018, that was correct. Now though, the compiler
                // is "smarter."
                //
                // https://stackoverflow.com/questions/52909623/rust-multiple-mutable-borrowing
                //
                //   https://stackoverflow.com/questions/50251487/what-are-non-lexical-lifetimes
                //let 
            }
            
            • OrekiWoof@lemmy.ml
              link
              fedilink
              arrow-up
              2
              ·
              4 months ago

              That’s insightful, thank you. It wasn’t hard to follow, I did have these exact same “adventures” but I guess I forgot about them after I figured out the ways to do things.

              Personally these kinds of things are exciting for me, trying to understand the constraints etc, so maybe that’s also why I don’t remember struggling with learning Rust, since it wasn’t painful for me 😅 If someone has to learn by being forced to and not out of their own will, it’s probably a lot harder

      • Metype @lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        I tried for about a week: reading documentation, viewing and modifying example programs, using a Rust IDE with warnings for all my silly mistakes, the works. I couldn’t manage to wrap my head around it. It’s so different from what I’m used to. If I could dedicate like a month to learn it I would, but I don’t have the time :/

    • ReakDuck@lemmy.ml
      link
      fedilink
      arrow-up
      5
      ·
      4 months ago

      At rhe beginning, I did hate it. Now I slowly embrace it as it seems like a feature to be mkre verbose.

      But maybe it will never change and I will just gaslight myself liking it. Whatever… you cant take my fun away learning rust for half a year

        • ReakDuck@lemmy.ml
          link
          fedilink
          arrow-up
          1
          ·
          4 months ago

          I hate how I can’t do everything I imagine in rust.

          But researching about why something isn’t possible, makes me realize that the code should never be wroten like the way I did… so I can’t blame rust for dissallowing me this.

    • Wooki@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      4 months ago

      You’ve been blue pilled by null. Once over the hurdle, it’s very eloquent.

      Null is ugly. Tony Hoare apology for inventing it should be enough reason to learn to do better.

  • ᕙ(⇀‸↼‶)ᕗ@lemm.ee
    link
    fedilink
    arrow-up
    21
    ·
    4 months ago

    RUST ppl feel like ARCH ppl. yes it might be better than some other setup yadda yadda, but they are so enervating.i’d rather switch back to windows11 than read another post/blog on how som crustians replaced this or that c library. just shut up already.

    • wewbull@feddit.uk
      link
      fedilink
      English
      arrow-up
      6
      ·
      4 months ago

      Arch people tell you “I use arch BTW”

      Rust people make PRs rewriting your code in rust.

      Rust people are worse.

    • ZILtoid1991@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      4 months ago

      The sad thing is, there are other languages better at replacing C/C++ due to closer resemblance, except they’re rarely used due to lack of trendy technology that is being hyped in Rust. D lost a lot of ground due to its maintainers didn’t make it an “immutable by default” language at the time when functional programming paradigm was the next big thing in programming (which D can still do, as long as you’re not too fussy about using const everywhere).

      • merthyr1831@lemmy.ml
        link
        fedilink
        English
        arrow-up
        24
        ·
        4 months ago

        It was never about replacing C with a new language for the sake of novelty, it was about solving the large majority of security vulnerabilities that are inherent in memory-unsafe languages.

        If Rust were to implode tomorrow, some other memory-safe language would come along and become equally annoying to developers who think they’re the first and only person to suggest just checking the code really hard for memory issues before merge.

  • ik5pvx@lemmy.world
    link
    fedilink
    arrow-up
    20
    ·
    4 months ago

    At the cost of sounding naive and stupid, wouldn’t it be possible to improve compilers to not spew out unsafe executables? Maybe as a compile time option so people have time to correct the source.

    • chrash0@lemmy.world
      link
      fedilink
      arrow-up
      69
      ·
      4 months ago

      the semantics of C make that virtually impossible. the compiler would have to make some semantics of the language invalid, invalidating patterns that are more than likely highly utilized in existing code, thus we have Rust, which built its semantics around those safety concepts from the beginning. there’s just no way for the compiler to know the lifetime of some variables without some semantic indication

    • it_depends_man@lemmy.world
      link
      fedilink
      English
      arrow-up
      52
      ·
      4 months ago

      At the cost of sounding naive and stupid

      It may be a naive question, but it’s a very important naive question. Naive doesn’t mean bad.

      The answer is that that is not possible, because the compiler is supposed to translate the very specific language of C into mostly very specific machine instructions. The programmers who wrote the code, did so because they usually expect a very specific behavior. So, that would be broken.

      But also, the “unsafety” is in the behavior of the system and built into the language and the compiler.

      It’s a bit of a flawed comparison, but you can’t build a house on a foundation of wooden poles, because of the advantages that wood offers, and then complain that they are flammable. You can build it in steel, but you have to replace all of the poles. Just the poles on the left side won’t do.

      And you can’t automatically detect the unsafe parts and just patch those either. If we could, we could just fix them directly or we could automatically transpile them. Darpa is trying that at the moment.

      • ik5pvx@lemmy.world
        link
        fedilink
        arrow-up
        14
        ·
        4 months ago

        Thank you and all the others that took time to educate me on what is for me a “I know some of those words” subject

    • snaggen@programming.dev
      link
      fedilink
      arrow-up
      16
      ·
      edit-2
      4 months ago

      The problem is that C is a prehistoric language and don’t have any of the complex types for example. So, in a modern language you create a String. That string will have a length, and some well defined properties (like encoding and such). With C you have a char * , which is just a pointer to the memory that contains bytes, and hopefully is null terminated. The null termination is defined, but not enforced. Any encoding is whatever the developer had in mind. So the compiler just don’t have the information to make any decisions. In rust you know exactly how long something lives, if something try to use it after that, the compiler can tell you. With C, all lifetimes lives in the developers head, and the compiler have no way of knowing. So, all these typing and properties of modern languages, are basically the implementation of your suggestion.

    • zaphod@sopuli.xyz
      link
      fedilink
      arrow-up
      14
      ·
      4 months ago

      Modern C compilers have a lot of features you can use to check for example for memory errors. Rusts borrow-checker is much stricter as it’s designed to be part of the language, but for low-level code like the Linux kernel you’ll end up having to use Rust’s unsafe feature on a lot of code to do things from talking to actual hardware to just implementing certain data structures and then Rust is about as good as C.

    • 0x0@programming.dev
      link
      fedilink
      arrow-up
      9
      ·
      4 months ago

      Compilers follow specs and in some cases you can have undefined behavior. You can and should use compiler flags but should complement that with good programming practices (e.g. TDD) and other tools in your pipeline (such as valgrind).

      • henfredemars@infosec.pub
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        I’d like to add that there’s a difference between unsafe and unspecified behavior. Sometimes I’d like the compiler to produce my unsafe code that has specified behavior. In this case, I want the compiler to produce exactly that unsafe behavior that was specified according to the language semantics.

        Especially when developing a kernel or in an embedded system, an example would be code that references a pointer from a hardcoded constant address. Perhaps this code then performs pointer arithmetic to access other addresses. It’s clear what the code should literally do, but it’s quite an unsafe thing to do unless you as the developer have some special knowledge that you know the address is accessible and contains data that makes sense to be processed in such a manner. This can be the case when interacting directly with registers representing some physical device or peripheral, but of course, there’s nothing in the language that would suggest doing this is safe. It’s making dangerous assumptions that are not enforced as part of the program. Those assumptions are only true in the program is running on the hardware that makes this a valid thing to do, where that magical address and offsets to that address do represent something I can read in memory.

        Of course, pointer arithmetic can be quite dangerous, but I think the point still stands that behavior can be specified and unsafe in a sense.

    • henfredemars@infosec.pub
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 months ago

      This has been done to a limited extent. Some compilers can check for common cases and you can enforce these warnings as errors. However, this is generally not possible as others have described because the language itself has behaviors that are not safe, and too much code relies on those properties that are fundamentally unsafe.