Originally posted by archkde
View Post
Announcement
Collapse
No announcement yet.
GCC Rust Approved By Steering Committee, Likely To Land For GCC 13
Collapse
X
-
Originally posted by reba View Post
Holy moly, the linked post is so full of things I'd like to counter but that would take too much time.
What really struck me was this:
This is plain stupidity and/or stubborness and/or denial.
Being proud to use a language that makes it easy to segfault or buffer overflow is... I lack words.
Tell that to decades old buffer overflow bugs in critical software.. kernel, ssl, core utils, su, ...
Because that's sooo good to have than just to replace programs from decades ago, with a programming mindset and tooling from decades ago, in a language that prevents you from doing errors or even stupidity (I'm more clever than the compiler, let me use this ubercool trick because I'm a laet programmer).
Gosh, people need to realize programs are not about them or their ego, it's about the users and assets those programs get in contact with - which are to protect at all costs, with the most effort on preventing damage; neglecting this because of ego is... I lack words again.
- Likes 3
Comment
-
Originally posted by Anux View Post
I thought the borrow checker is an integral part of rust, how can it even work without that?
- Likes 4
Comment
-
Drew DeVault - a.k.a SirCmpwn in another community which he attended earlier/younger and wasn't quite entirely appreciated because of some of his posts and actions - has produced a significant number of posts and code bases in the recent years. Many of those are thought-provoking and at least interesting; some of them are even useful / very useful.
"Yes, Rust is more safe. I don’t really care. In light of all of these problems, I’ll take my segfaults and buffer overflows." is one of the things he's wrong about, indeed. It's a clear fact that Rust isn't a silver bullet for everything, but making brand-new unsafe languages in reaction to safer languages such as Rust is a step in the wrong direction, for users' sake.
- Likes 4
Comment
-
Originally posted by Sin2x View Post
The funniest thing is that the context of this post is specifically kernel programming -- where writing non-unsafe code is impossible by definition.
- Likes 5
Comment
-
-
Originally posted by archkde View Post
I don't see why this post should have a kernel programming context. Anyway, writing non-unsafe code in a kernel is not only possible, but in fact a very good idea. Sure, you need to implement some things using unsafe, but then you build safe abstractions over it. No more forgetting about "this function needs interrupts disabled and the RCU lock on xyz held", the compiler will complain to you. I can imagine this to be particularly useful with regards to resource management (maybe even userspace vs kernel resources), as well as concurrency (think interrupts, preemption, SMP and a userspace constantly waiting to exploit your bugs).
As for safe/unsafe code in kernels -- your point has architectural sense only if the whole of the kernel is written in Rust. Linux kernel is not and thinking that it is going to be fully rewritten in Rust is delusional.
- Likes 3
Comment
Comment