Wedson Almeida Filho is a Microsoft engineer who has been prolific in his contributions to the Rust for the Linux kernel code over the past several years. Wedson has worked on many Rust Linux kernel features and even did a experimental EXT2 file-system driver port to Rust. But he’s had enough and is now stepping away from the Rust for Linux efforts.
From Wedon’s post on the kernel mailing list:
I am retiring from the project. After almost 4 years, I find myself lacking the energy and enthusiasm I once had to respond to some of the nontechnical nonsense, so it’s best to leave it up to those who still have it in them.
…
I truly believe the future of kernels is with memory-safe languages. I am no visionary but if Linux doesn’t internalize this, I’m afraid some other kernel will do to it what it did to Unix.
Lastly, I’ll leave a small, 3min 30s, sample for context here: https://youtu.be/WiPp9YEBV0Q?t=1529 – and to reiterate, no one is trying force anyone else to learn Rust nor prevent refactorings of C code."
omfg, that guy in the video…
Ted Ts’o is a prick with a god complex. I understand his experience is hard to match, we all have something in our lives we’re that good at, but that does not need to lead to acting like a fucking religious fanatic.
Agreed. His experience might be useful if he were there to engage, but he’s clearly not. It seems like he just wanted to shout down the project and it seems like he was somewhat successful.
No intention of validating that behavior, it’s uncalled for and childish, but I think there is another bit of “nontechnical nonsense” on the opposite side of this annoying religious war: the RIIR crowd. Longstanding C projects (sometimes even projects written in dynamic languages…?) get people that know very little about the project, or at least have never contributed, asking for it to be rewritten or refactored in Rust and it’s likely just as tiring as the defensive C people when you want to include Rust in the kernel.
People need to chill out on both sides of this weird religious war; a programming language is just a tool.
I imagine this mentality is frustrating because of how many times they have to explain that they weren’t forcing people to learn Rust and that the Rust bindings were second class citizens. They never said to rewrite the kernel in Rust.
That’s disengenuous though.
-
We’re not forcing you to learn rust. We’ll just place code in your security critical project in a language you don’t know.
-
Rust is a second class citizen, but we feel rust is the superior language and all code should eventually benefit from it’s memory safety.
-
We’re not suggesting that code needs to be rewritten in rust, but the Linux kernel development must internalise the need for memory safe languages.
No other language community does what the rust community does. Haskellers don’t go to the Emacs project and say “We’d like to write Emacs modules, but we think Haskell is a much nicer and safer functional language than Lisp, so how about we add the capability of using Haskell and Lisp?”. Pythonistas didn’t add Python support to Rails along side Ruby.
Rusties seem to want to convert everyone by Trojan horsing their way into communities. It’s extremely damaging, both to those communities and to rust itself.
It doesn’t help that the Rust community tends to bring extremely divisive politics with it in places and ways that just don’t need to happen, starting battles that aren’t even tangentially related to programming.
-
That is the most sensible look into this so far.
Who is Ted Ts’ in this context?
He’s the guy you hear vexing rust in the video posted. While both languages have their pros and cons, he chooses to just blast this other guy by repeating the same crap over and over without letting him reply. Basically the kind of person with a “I win because I’m louder” demeanor.
I understand his experience is hard to match, we all have something in our lives we’re that good at
At some point, that mix of experience and ego becomes a significant liability. He’s directly hurting the adoption of Rust in the kernel, while the C code he’s responsible for is full of problems that would have been impossible if written in safe Rust.
CVE-2024-42304 — crash from undocumented function parameter invariants
CVE-2024-0775 — use-after-free
CVE-2023-2513 — use-after-free
CVE-2023-1252 — use-after-free
CVE-2020-14314 — out of bounds read
CVE-2019-19447 — use-after-free
CVE-2018-10879 — use-after-free
CVE-2018-10881 — out of bounds read
CVE-2014-8086 — race condition
CVE-2009-0748 — null pointer dereferenceDude, three CVEs were enough. Stop kicking the blood puddle.
crash from undocumented function parameter invariants
My favourite, as that was the exact point the dev was making in his talk, that the stuff is badly documented and that the function signature would document it perfectly.
My favorite, as that is the exact point made by anti-rust people.
What kind of type signature would prove the first block of any directory in an ext4 filesystem image isn’t a hole?
The first directory block is a hole. But type == DIRENT, so no error is reported. After that, we get a directory block without ‘.’ and ‘…’ but with a valid dentry. This may cause some code that relies on dot or dotdot (such as make_indexed_dir()) to crash
The problem isn’t that the block is a hole. It’s that the downstream function expects the directory block to contain
.
and..
, and it gets given one without because of incorrect error handling.You can encode the invariant of “has dot and dot dot” using a refinement type and smart constructor. The refined type would be a directory block with a guarantee it meets that invariant, and an instance of it could only be created through a function that validates the invariant. If the invariant is met, you get the refined type. If it isn’t, you only get an error.
This doesn’t work in C, but in languages with stricter type systems, refinement types are a huge advantage.
Wouldn’t it still crash when the smart constructor was called?
If it were poorly designed and used exceptions, yes. The correct way to design smart constructors is to not actually use a constructor directly but instead use a static method that forces the caller to handle both cases (or explicitly ignore the failure case). The static method would have a return type that either indicates “success and here’s the refined type” or “error and this is why.”
In Rust terminology, that would be a
Result<T, Error>
.For Go, it would be
(*RefinedType, error)
(where dereferencing the first value without checking it would be at your own peril).C++ would look similar to Rust, but it doesn’t come as part of the standard library last I checked.
C doesn’t have the language-level features to be able to do this. You can’t make a refined type that’s accessible as a type while also making it impossible to construct arbitrarily.
You can do that in C, too.
What kind of type signature would prove the first block of any directory in an ext4 filesystem image isn’t a hole?
I don’t know if the type system proves it’s not a hole, but the type system certainly seems to force consumers to contend with the possibility by surfacing the outcomes at the type system level. That’s what the
Either
is doing in the example’s return type, is it not?fn get_or_create_inode( &self, ino: Ino ) -> Result<Either<ARef<Inode<T>>, inode::New<T>>>
At the cost of sounding naive and stupid, wouldn’t it be possible to improve compilers to not spew out unsafe executables? Maybe as a compile time option so people have time to correct the source.
Compilers follow specs and in some cases you can have undefined behavior. You can and should use compiler flags but should complement that with good programming practices (e.g. TDD) and other tools in your pipeline (such as valgrind).
The problem is that C is a prehistoric language and don’t have any of the complex types for example. So, in a modern language you create a String. That string will have a length, and some well defined properties (like encoding and such). With C you have a char * , which is just a pointer to the memory that contains bytes, and hopefully is null terminated. The null termination is defined, but not enforced. Any encoding is whatever the developer had in mind. So the compiler just don’t have the information to make any decisions. In rust you know exactly how long something lives, if something try to use it after that, the compiler can tell you. With C, all lifetimes lives in the developers head, and the compiler have no way of knowing. So, all these typing and properties of modern languages, are basically the implementation of your suggestion.
the semantics of C make that virtually impossible. the compiler would have to make some semantics of the language invalid, invalidating patterns that are more than likely highly utilized in existing code, thus we have Rust, which built its semantics around those safety concepts from the beginning. there’s just no way for the compiler to know the lifetime of some variables without some semantic indication
Modern C compilers have a lot of features you can use to check for example for memory errors. Rusts borrow-checker is much stricter as it’s designed to be part of the language, but for low-level code like the Linux kernel you’ll end up having to use Rust’s
unsafe
feature on a lot of code to do things from talking to actual hardware to just implementing certain data structures and then Rust is about as good as C.This has been done to a limited extent. Some compilers can check for common cases and you can enforce these warnings as errors. However, this is generally not possible as others have described because the language itself has behaviors that are not safe, and too much code relies on those properties that are fundamentally unsafe.
If you write unsafe code then how should it compile?
I’d like to add that there’s a difference between unsafe and unspecified behavior. Sometimes I’d like the compiler to produce my unsafe code that has specified behavior. In this case, I want the compiler to produce exactly that unsafe behavior that was specified according to the language semantics.
Especially when developing a kernel or in an embedded system, an example would be code that references a pointer from a hardcoded constant address. Perhaps this code then performs pointer arithmetic to access other addresses. It’s clear what the code should literally do, but it’s quite an unsafe thing to do unless you as the developer have some special knowledge that you know the address is accessible and contains data that makes sense to be processed in such a manner. This can be the case when interacting directly with registers representing some physical device or peripheral, but of course, there’s nothing in the language that would suggest doing this is safe. It’s making dangerous assumptions that are not enforced as part of the program. Those assumptions are only true in the program is running on the hardware that makes this a valid thing to do, where that magical address and offsets to that address do represent something I can read in memory.
Of course, pointer arithmetic can be quite dangerous, but I think the point still stands that behavior can be specified and unsafe in a sense.
At the cost of sounding naive and stupid
It may be a naive question, but it’s a very important naive question. Naive doesn’t mean bad.
The answer is that that is not possible, because the compiler is supposed to translate the very specific language of C into mostly very specific machine instructions. The programmers who wrote the code, did so because they usually expect a very specific behavior. So, that would be broken.
But also, the “unsafety” is in the behavior of the system and built into the language and the compiler.
It’s a bit of a flawed comparison, but you can’t build a house on a foundation of wooden poles, because of the advantages that wood offers, and then complain that they are flammable. You can build it in steel, but you have to replace all of the poles. Just the poles on the left side won’t do.
And you can’t automatically detect the unsafe parts and just patch those either. If we could, we could just fix them directly or we could automatically transpile them. Darpa is trying that at the moment.
Thank you and all the others that took time to educate me on what is for me a “I know some of those words” subject
Meaning a (current) kernel is actually a C to machine code transpiler?
RUST ppl feel like ARCH ppl. yes it might be better than some other setup yadda yadda, but they are so enervating.i’d rather switch back to windows11 than read another post/blog on how som crustians replaced this or that c library. just shut up already.
Arch people tell you “I use arch BTW”
Rust people make PRs rewriting your code in rust.
Rust people are worse.
The sad thing is, there are other languages better at replacing C/C++ due to closer resemblance, except they’re rarely used due to lack of trendy technology that is being hyped in Rust. D lost a lot of ground due to its maintainers didn’t make it an “immutable by default” language at the time when functional programming paradigm was the next big thing in programming (which D can still do, as long as you’re not too fussy about using
const
everywhere).It was never about replacing C with a new language for the sake of novelty, it was about solving the large majority of security vulnerabilities that are inherent in memory-unsafe languages.
If Rust were to implode tomorrow, some other memory-safe language would come along and become equally annoying to developers who think they’re the first and only person to suggest just checking the code really hard for memory issues before merge.
if you were right they’d replace it with Java.
Rust’s memory safety is at compile-time. Java relies on a virtual machine and garbage collector. Nothing wrong with that approach but there’s a reason Rust is used in kernels and Java is used in userspace apps.
What is so hard to understand, C Is a fucking security issues?
Who was the guy that had a lot of pauses with mmmmmm when talking?
Someone linked the thread from this forum called Phoronix and the comments are so awful. Imagine having to deal with people like this.
One of them reads:
We need Microsoft people like we need fleas. Why can’t they work for projects we don’t like, like GNOME?
It is funny because Ts’o works at Google, lol.
Phoronix comments are a special place on the internet. Don’t go there for a good discussion.
I once started reading the comments on bcachefs. It was a extremely heated for no reason. People were screaming on the nature of btrfs
Phoronix comments were always dumb, like, infuriating bad, I don’t even read them anymore, the moderation on that site don’t give a fuck about toxicity in there
Beyond moderation, Phoronix is a case study in why downvotes are a good thing. Those idiots going on dumb tangents would continue, while the rest of us can read the actual worthwhile comments (which does happen, given AMD employees and the like comment there sometimes).
Avis/Bridei/Artem has been active as a super troll on that forum for years and absolutely nothing had been done
I’ve asked one question, one time in those comments and it just got buried in people spitting venom at each other about their file system preferences.
The comments from that article are some of the most vitriolic I’ve ever seen on a technical issue. Goes to prove the maintainer’s point though.
Some are good for a laugh though, like assertions that Rust in the kernel is a Microsoft sabotage op or LLVM is for grifters and thieves.
You can’t teach old dogs new tricks.
You can, but you can’t turn a 30 year project on a dime. They’re understandably frustrated that newcomers keep coming and screaming RUST RUST RUST RUST RUST
yeah but this isn’t newcomers making noise. This is seasoned devs making meaningful contributions, and getting reactionary responses
My grandpa taught himself to text when he was 89. He just wrote a translation table:
A = 2
B = 22
C = 222
D = 3
…You actually can. And it’s not that hard. I had a 14 year old German shepherd mix, who learned several new tricks before her death. I taught a partially blind 79 year old to use a computer, general internet, and email, and was communicating with her [via email] for a number of years before she lost the rest of her vision.
Old dogs, as it were, absolutely can learn new tricks.
Sorry, I just don’t like this idiom, because it puts people in a box in which they do not belong.
That’s very wholesome to hear! :) Thank you for sharing. I’m glad it’s not the case.
Many years ago at work, when PCs started to spread, I taught a 60 years old lady how to use one. She never saw a PC before yet she learned pretty well, and I saw much younger people not learning.
Being willing to learn doesn’t depend on age, it’s a mindset, either you have it or you don’t, and if you do have it, it will last your entire life.
People are dumb as hell, it’s fucking open source, go maintain the c fork, and let the those who want to improve the fucking shit cve producing codebase make a rust fork. And see which one people will use, and we all know that the rust fork will have wider adoption, it’s a no brainer.
No one is forcing them to maintain the Linux kernel, no one is telling them to stop writing patches, they can’t because you can download the code and work on it as you like.
It’s people who know they will be irrelevant because they spent decades producing shit software, and they can’t even be bothered to learn a new language to improve stability and security for the whole fucking userbase. Give me a break, what a bunch of whiners.
Unix -> Linux -> Ferrix?
It’s people who know they will be irrelevant because they spent decades producing shit software
So the Linux kernel is shit software now? Just because it’s not written in the newest programming language? Kind of a hot take.
No because it is buggy and have a bunch of security flaws.
Nobody can maintan a fork of the linux kernel on their own or even with a team. It’s a HUGE task.
There already is rust in part of the linux kernel. It’s not a fork.
But I agree with your first statement, people are dumb as hell, me included lol
No shit
This is such a dumb take. For as much as I’d like to have a safer language in the kernel you need the current developers, the “big heads” at least because they have a lot of niche knowledge about their domains and how they implementation works (regardless of language) People shouldn’t take shit like this from the ext4 developer, but it doesn’t mean we should start vilifying all of them.
This guy’s concerns are real and valid but were expressed with the maturity of a lunatic child, but they are not all like this.
If anything, the constant coddling of a few aging individuals within the kernel and the protection of their comforts is why Linux has been so slow to adopt technologies and paradigms that developers are begging for.
Linus complains of dev burnout starving the kernel of contributors, but the processes and technologies driving kernel development are antiquated, and the very suggestion of change is either discarded or makes you the target of a public shaming by Linus himself.
I agree with your views. But I have to give praise to Linus for bringing Rust into the kernel.
Yes and the big heads in this case don’t want to share that knowledge, because why? Because they are treating the kernel like their pet project that they own and control, and they don’t wanna lose that control, rather looking at the bigger picture.
It’s kinda obvious that rust is the way forward as google has clearly shown, so why are they gatekeeping?
When did they refuse to share knowledge?
That was what he was talking about at the conference, he literally asked for help about how things work, so he could write better APIs that they are more comfortable using.
But the response was we don’t want to write rust.
So what’s the solution that doesn’t involve C programmers writing Rust?
There’s is no other way, C is a security issue - do you understand?
So you want to force C programmers to write Rust or GTFO.
Yes I agree but the solution for a project so big and critical is not to fork. How do you maintain all of it while at the same time adding support to Rust?
There’s no solution, they need not only to accept that rust is going to be part of the kernel but also that it’s a good thing. Otherwise how do you cooperate efficiently.
And also if they are so big brained, should be easy to learn rust then, I mean I’m pretty small brained and I know rust.
“There’s no compromise, I’M RIGHT AND YOU’RE WRONG!”
no wonder everyone hates rustphiles
What compromise? Half code should be in rust?
What does this even have to do with rust developers, The language rust gives us the ability to have more compile time checks, and why is that a bad thing. Do you like security issues in your OS because some dev forgot to handle pointers correctly?
The only compromise Rust programmers would accept is C programmers learn Rust so when they break Rust code they can fix it.
Removed by mod
That doesn’t really excuse its behavior in the video though.
At rhe beginning, I did hate it. Now I slowly embrace it as it seems like a feature to be mkre verbose.
But maybe it will never change and I will just gaslight myself liking it. Whatever… you cant take my fun away learning rust for half a year
Removed by mod
Well, I’ve been a C/C++ dev for half of my career, I didn’t find Rust syntax ugly. Some things are better than others, but not a major departure from C/C++. ObjC is where ugly is at. And I even think swift is more ugly. In fact, I can’t find too many that are as close to C/C++ as Rust. As for logic… Well, I want to say you’ll get used to it, but for some things, it’s not true. Rust is a struggle. Whether it’s worth it, is your choice. I personally would take it over C++ any day.
Removed by mod
When in doubt - C4!
I just don’t understand this. You get used to the syntax and borrow checker in a day or two. It’s a non-issue.
I wouldn’t say that. For primitives yeah, day or two. But if you want to build a proper program, it’ll take time to get used to it. For my first few projects I just used clone everywhere. Passing by reference and managing lifetimes, specially when writing libraries is something that takes time to get used to. I still don’t feel confident.
Besides that I do like Rust though. Sometimes I feel like “just let me do that, C let’s me”, but I know it’s just adding safety where C wouldn’t care.
Removed by mod
You get used to the syntax and borrow checker in a day or two.
As someone who spent a couple months learning rust, this was half true for me. The syntax? Yeah. No problem. The borrow-checker (and Rust’s concept of ownership and lifetimes in general)? Absolutely not. That was entirely new territory for me.
Could you specify some kind of example where things were hard?
I’ll try :) Looks like I still have my code from when I was grinding through The Book, and there’s a couple spots that might be illuminating from a pedagogical standpoint. That being said, I’m sure my thought process, and “what was active code and what was commented out and when,” will probably be hard to follow.
My first confusion was in
deref coercionauto dereferencing (edit: see? it’s still probably not 100% in my head :P), and my confusion pretty much matched this StackOverflow entry:https://stackoverflow.com/questions/28519997/what-are-rusts-exact-auto-dereferencing-rules
It took me until Chapter 15 of The Book (on Boxes) to really get a feel for what was happening. My work and comments for Chapter 15:
use crate::List::{Cons, Nil}; use std::ops::Deref; enum List { Cons(i32, Box<List>), Nil, } struct MyBox<T>(T); impl<T> Deref for MyBox<T> { type Target = T; fn deref(&self) -> &Self::Target { &self.0 } } impl<T> MyBox<T> { fn new(x: T) -> MyBox<T> { MyBox(x) } } #[derive(Debug)] struct CustomSmartPointer { data: String, } impl Drop for CustomSmartPointer { fn drop(&mut self) { println!("Dropping CustomSmartPointer with data `{}`!", self.data); } } fn main() { let b = Box::new(5); println!("b = {}", b); let _list = Cons(1, Box::new(Cons(2, Box::new(Cons(3,Box::new(Nil)))))); let x = 5; let y = MyBox::new(x); assert_eq!(5,x); assert_eq!(5, *y); let m = MyBox::new(String::from("Rust")); hello(&m); hello(m.deref()); hello(m.deref().deref()); hello(&(*m)[..]); hello(&(m.deref())[..]); hello(&(*(m.deref()))[..]); hello(&(*(m.deref()))); hello((*(m.deref())).deref()); // so many equivalent ways. I think I'm understanding what happens // at various stages though, and why deref coercion was added to // the language. Would cut down on arguing over which of these myriad // cases is "idomatic." Instead, let the compiler figure out if there's // a path to the desired end state (&str). // drop stuff below ... let _c = CustomSmartPointer { data: String::from("my stuff"), }; let _d = CustomSmartPointer { data: String::from("other stuff"), }; println!("CustomSmartPointers created."); drop(_c); println!("CustomSmartPointer dropped before the end of main."); // this should fail. //println!("{:?}", _c); // yep, it does. } fn hello(name: &str) { println!("Hello, {name}!"); }
Another thing that ended up biting me in the ass was Non-Lexical Lifetimes (NLLs). My code from Chapter 8 (on HashMaps):
use std::collections::HashMap; fn print_type_of<T>(_: &T) { println!("{}", std::any::type_name::<T>()) } fn main() { let mut scores = HashMap::new(); scores.insert(String::from("Red"), 10); scores.insert(String::from("Blue"), 20); let score1 = scores.get(&String::from("Blue")).unwrap_or(&0); println!("score for blue is {score1}"); print_type_of(&score1); //&i32 let score2 = scores.get(&String::from("Blue")).copied().unwrap_or(0); println!("score for blue is {score2}"); print_type_of(&score2); //i32 // hmmm... I'm thinking score1 is a "borrow" of memory "owned" by the // hashmap. What if we modify the blue teams score now? My gut tells // me the compiler would complain, since `score1` is no longer what // we thought it was. But would touching the score of Red in the hash // map still be valid? Let's find out. // Yep! The below two lines barf! //scores.insert(String::from("Blue"),15); //println!("score for blue is {score1}"); // But can we fiddle with red independently? // Nope. Not valid. So... the ownership must be on the HashMap as a whole, // not pieces of its memory. I wonder if there's a way to make ownership // more piecemeal than that. //scores.insert(String::from("Red"),25); //println!("score for blue is {score1}"); // And what if we pass in references/borrows for the value? let mut refscores = HashMap::new(); let mut red_score:u32 = 11; let mut blue_score:u32 = 21; let default:u32 = 0; refscores.insert(String::from("red"),&red_score); refscores.insert(String::from("blue"),&blue_score); let refscore1 = refscores.get(&String::from("red")).copied().unwrap_or(&default); println!("refscore1 is {refscore1}"); // and then update the underlying value? // Yep. This barfs, as expected. Can't mutate red_score because it's // borrowed inside the HashMap. //red_score = 12; //println!("refscore1 is {refscore1}"); // what if we have mutable refs/borrows though? is that allowed? let mut mutrefscores = HashMap::new(); let mut yellow_score:u32 = 12; let mut green_score:u32 = 22; let mut default2:u32 = 0; mutrefscores.insert(String::from("yellow"),&mut yellow_score); mutrefscores.insert(String::from("green"),&mut green_score); //println!("{:?}", mutrefscores); let mutrefscore1 = mutrefscores.get(&String::from("yellow")).unwrap();//.unwrap_or(&&default2); //println!("{:?}",mutrefscore1); println!("mutrefscore1 is {mutrefscore1}"); // so it's allowed. But do we have the same "can't mutate in two places" // rule? I think so. Let's find out. // yep. same failure as before. makes sense. //yellow_score = 13; //println!("mutrefscore1 is {mutrefscore1}"); // updating entries... let mut update = HashMap::new(); update.insert(String::from("blue"),10); //let redscore = update.entry(String::from("red")).or_insert(50); update.entry(String::from("red")).or_insert(50); //let bluescore = update.entry(String::from("blue")).or_insert(12); update.entry(String::from("blue")).or_insert(12); //println!("redscore is {redscore}"); //println!("bluescore is {bluescore}"); println!("{:?}",update); // hmmm.... so we can iterate one by one and do the redscore/bluescore // dance, but not in the same scope I guess. let mut updatesingle = HashMap::new(); updatesingle.insert(String::from("blue"),10); for i in "blue red".split_whitespace() { let score = updatesingle.entry(String::from(i)).or_insert(99); println!("score is {score}"); } // update based on contents let lolwut = "hello world wonderful world"; let mut lolmap = HashMap::new(); for word in lolwut.split_whitespace() { let entry = lolmap.entry(word).or_insert(0); *entry += 1; } println!("{:?}",lolmap); // it seems like you can only borrow the HashMap as a whole. // let's try updating entries outside the context of a forloop. let mut test = HashMap::new(); test.insert(String::from("hello"),0); test.insert(String::from("world"),0); let hello = test.entry(String::from("hello")).or_insert(0); *hello += 1; let world = test.entry(String::from("world")).or_insert(0); *world += 1; println!("{:?}",test); // huh? Why does this work? I'm borrowing two sections of the hashmap like before in the update // section. // what if i print the actual hello or world... // nope. barfs still. //println!("hello is {hello}"); // I *think* what is happening here has to do with lifetimes. E.g., // when I introduce the println macro for hello variable, the lifetime // gets extended and "crosses over" the second borrow, violating the // borrow checker rules. But, if there is no println macro for the hello // variable, then the lifetime for each test.entry is just the line it // happens on. // // Yeah. Looks like it has to do with Non-Lexical Lifetimes (NLLs), a // feature since 2018. I've been thinking of lifetimes as lexical this // whole time. And before 2018, that was correct. Now though, the compiler // is "smarter." // // https://stackoverflow.com/questions/52909623/rust-multiple-mutable-borrowing // // https://stackoverflow.com/questions/50251487/what-are-non-lexical-lifetimes //let }
That’s insightful, thank you. It wasn’t hard to follow, I did have these exact same “adventures” but I guess I forgot about them after I figured out the ways to do things.
Personally these kinds of things are exciting for me, trying to understand the constraints etc, so maybe that’s also why I don’t remember struggling with learning Rust, since it wasn’t painful for me 😅 If someone has to learn by being forced to and not out of their own will, it’s probably a lot harder
I tried for about a week: reading documentation, viewing and modifying example programs, using a Rust IDE with warnings for all my silly mistakes, the works. I couldn’t manage to wrap my head around it. It’s so different from what I’m used to. If I could dedicate like a month to learn it I would, but I don’t have the time :/
Unless you’re a functional programming purist or coming from a systems programming background, it takes a lot longer than a few days to get used to the borrow checker. If you’re coming as someone who most often uses garbage-collected languages, it’s even worse.
The problem isn’t so much understanding what the compiler is bitching about, as it is understanding why the paradigm you used isn’t safe and learning how to structure your code differently. That part takes the longest and only really starts to become easier when you learn to stop fighting the language.
I see that my previous comment is not the common reality apparently.
I’m mainly a C# + js dev of a few years, and I would love to see what precisely other people here are having problems with, because I’ve had a completely different experience to most of the people replying.
You’ve been blue pilled by null. Once over the hurdle, it’s very eloquent.
Null is ugly. Tony Hoare apology for inventing it should be enough reason to learn to do better.
The kernel is mostly written in C, by C developers… understandably they’re rather refactor C code to make it better instead of rewritting everything in the current fancy language that’ll save the world this time (especially considering proponents of said language always, at every chance they get, sell it as C is crap, this is better).
Linux is over 30yo and keeps getting better and more stable, that’s the power of open-source.
at every chance they get, sell it as C is crap, this is better
For ‘sendmail’ values of $C, this resembles another argument. Also, of course for $C=sysvinit.
This sounds exactly like the type of nontechnical nonsense they’re complaining about: attacking a strawman (“they’re trying to prevent people from refactoring C code and making them rewrite everything in the current fancy language”) even after explicitly calling out that that was not going to happen (“and to reiterate, no one is trying force anyone else to learn Rust nor prevent refactorings of C code”).
They said it wasn’t going to happen but their plan will result in it happening, how do you square that?
You tell me how it will result in it happening. Who even has the power to force people to learn Rust?
Linus and GKH, if they merge something that breaks every time C programmers change a kernel API
Better in what ways? Rust’s strong points are not to just make a program more stable, but more secure from a memory standpoint and I don’t think Linux keeps improving on that
C is crap for anything where security matters. I’ll happily take that debate with anyone who thinks differently.
C is crap for anything where security matters.
True for people misusing it. If you want to argue the ease of mis-use, it’s a fun talk.
Yea, it’s not C that is crap, but that it has zero guard rails. Like blaming a knife for not having a guard… Is it a bad knife without a guard? Depends on how sharp it is. The guard is orthogonal to the knife’s purpose, but might still be important when the knife is used.
Just because something doesn’t help prevent accidents does not mean it cannot serve its actual purpose well, unless its actual purpose is safety.
C isn’t even bad, as long as you use the minimum amount required and do a LOT of security analysis on every line you write.
The problem with C code isn’t necessarily the language, a lot of it is the culture of people who think that unlike everyone else, they can write good, secure, bug-free C code, and they can ignore the warnings. They’re just that good!
These people seem to take the mere concept of a language that enforces memory access or security features as an insult to their intelligence.
Because of this bullshit, Linux is now behind in terms of Rust take up as Windows has begun rewriting components into Rust. I wouldn’t be surprised if the ego-based in-fighting between kernel devs will lead to Windows being significantly more secure in a few years.
such a weird dichotomy in Windows – secure kernel space and privacy-nightmare user space … “we’re the only ones allowed to steal your data”
It’s a real shame. I would’ve loved running the Windows 7 or Windows XP userland on the Windows 11 kernel.
Agree. I’m an absolutely awesome software dev myself - and I know C by heart (being my favorite language after assembler). However, with age comes humility and the ability to recognize that I will write buggy code every now and then.
Better the language saves me when I can’t, in security critical situations.
Even if you manage to keep all memory accesses in your memory, while writing the code, there’s a good chance you’ll forget something when reviewing another person’s MR. That’s probably the main problem creator.
Still, a language that you are familiar with, is better than a new language that you haven’t finished reading the specifications of. And considering that adding new maintainers comes with a major effort of verifying trustworthiness, I get how it would be harder to switch.
What debate? You offered zero arguments and “C bad tho” isn’t one.
Do you believe C isn’t crap when it comes to security? Please explain why and I’ll happily debate you.
/fw hacker, reverse engineer
That’s not how it works. You said:
C is crap for anything where security matters.
Argue for your point.
Link dropping is also not arguing.
Citing scientific research is. Now, please post your gut feeling in response.
Lots of categories which Rust doesn’t prevent, and in the kernel you’ll end up with a lot of
unsafe
Rust, so it can’t guarantee memory-safety in all cases.The biggest items on the graph are all out of bounds accesses, use-after-free and overflows. It is undeniable that memory safe languages help reducing vulnerabilities, we know for decades that memory corruption vulnerabilities are both the most common and the most severe in programs written in memory-unsafe languages.
Unsafe rust is also not turning off every safety feature, and it’s much better to have clear highlighted and isolated parts of code that are unsafe, which can be more easily reviewed and tested, compared to everything suffering from those problems.
I don’t think there is debate here, rewriting is a huge effort, but the fact that using C is prone to memory corruption vulnerabilities and memory-safe languages are better from that regard is a fact.
Maybe when you build some little application or whatever. When building the most used kernel in the world, there are probably some considerations that very few people can even try to understand.
No idea what you’re being downvoted. Just take a look at all the critical CVSS scored vulnerabilities in the Linux kernel over the past decade. They’re all overwhelmingly due to pitfalls of the C language - they’re rarely architectural issues but instead because some extra fluff wasn’t added to double check the size of an int or a struct etc. Use after frees, out of bounds reads, etc.
These are pretty much wiped out entirely by Rust and caught at compile time (or at runtime with a panic).
The cognitive load of writing safe C, and the volume of extra code it requires, is the problem of C.
You can write safe C, if you know what you’re doing (but as shown by the volume of vulns, even the world’s best C programmers still make slip ups).
Rust forces safe® code without any of the cognitive load of C and without having to go out of your way to learn it and religiously implement it.
The cognitive load of writing safe C, and the volume of extra code it requires, is the problem of C.
Oh no, i’m having a meltdown with all the cognitive load…
Build all the fancy tools you want. At the end of the day if you put a monkey at the wheel of a Ferrari you’ll still have problems.
Nice that Rust is memory-safe, use it if you want, but why the insistence on selling Rust via C is crap? Doesn’t earn you any points.
How about rustaceans fork the kernel and once it’s fully Rust-only then try and get it to be used instead of the current one… win-win, eh?
At the end of the day if you put a monkey at the wheel of a Ferrari you’ll still have problems.
My eyes are rolling onto the floor and down the stairs.
I honestly like the cognitive load. Just not when I am at the workplace, having to deal with said load, with the office banter in the background and (not so) occasionally, being interrupted for other stuff.
And my cognitive load is not even about the memory allocations, most of the time.Off topic:
I think, if one is seriously learning programming from a young age, it is better to start with C, make a project, big enough to feel the difficulty and understand what the cognitive load is all about and get used to it, hence increasing their mental capability. Then learn the memory safe language of their choice.
I never made a big enough project in C, but you can get to feel the load in C++ too.I’m not insisting anything; stating C is not a memory-safe language isn’t a subjective opinion.
Note I’m not even a Rust fan; I still prefer C because it’s what I know. But the kernel isn’t written by a bunch of Lewis Hamiltons; so many patches are from one-time contributors and the kernel continues to get inundated with memory safety bugs that no amount of infrastructure, testing, code review, etc is catching. Linux is written by monkeys with a few Hamiltons doing their best to review everything before merging.
Linus has talked about this repeatedly over the past few years at numerous conferences and there’s a reason he’s integrating Rust drivers and subsystems (and not asking them to fork as you are suggesting) to stop the kernel stagnating and to begin to address the issues like one-off patches that aren’t maintained by their original author and to start squashing the volume of memory corruption bugs that are causing 2/3rds of the kernel’s vulnerabilities.
the kernel continues to get inundated with memory safety bugs that no amount of infrastructure, testing, code review, etc is catching.
I’d say this is the issue to fix. It’s not easy but if anything curl has proven it can be done efficiently.
Yeah, let’s see what Bagder has to say about this:
C is unsafe and always will be
The C programming language is not memory-safe. Among the 150 reported curl CVEs, we have determined that 61 of them are “C mistakes”. Problems that most likely would not have happened had we used a memory-safe language. 40.6% of the vulnerabilities in curl reported so far could have been avoided by using another language.
Rust is virtually the only memory-safe language that is starting to become viable.
https://daniel.haxx.se/blog/2023/12/13/making-it-harder-to-do-wrong/
Memory safe language that’s becoming viable … as a proper replacement of C.
There are many other memory safe languages out there. Just not ones most would like to pull in to the kernel…
Yes a monkey. All the vulnerabilities that have happened over the decades are just bad c programmers. So the question is are there any good c programmers?
It’s not just about bad/good C programmers. It’s also about how much of the context, the given C programmer has read to make sure they know enough of what they are doing.
No matter how good one is at Programming, they need to make sure to read and remember what is happening in relevant parts of code, while making their one off contribution.
That’s where the part of “leaving it to the computer” comes in. Hence, the usefulness of code checkers and even better if the compiler itself enforces the stuff. As long as the rules are good enough.
Let’s just hope we are not jumping to another language 20 years down the line.
Someone stubbed a toe here.
They’re being downvoted because it’s a silly comment that is basically unrelated and also extremely unhelpful. Everyone can agree that C has footguns and isn’t memory safe, but writing a kernel isn’t memory safe. A kernel written in Rust will have tons of unsafe, just look at Redox: https://github.com/search?q=repo%3Aredox-os%2Fkernel unsafe&type=code That doesn’t mean it isn’t more safe even in kernel space, but the issues with introducing Rust into the kernel, which is already written in C, are more nuanced than “C bad”. The religious “C bad” and “C good” arguments are kinda exactly the issue on display in the OP.
I say this as someone who writes mostly Rust instead of C and is in favor of Rust in the kernel.
The difference is that now you have a scope of where the memory unsafe code might be(unsafe keyword) and you look there instead of all the C code.
I agree and think that should be helpful, but I hesitate to say how much easier that actually makes writing sound unsafe code. I’d think most experienced C developers also implicitly know when they’re doing unsafe things, with or without an
unsafe
block in the language – although I think the explicitunsafe
should likely help code reviewers and tired developers.It is possible to write highly unsafe code in Rust while each individual
unsafe
block appears sound. As a simple example: https://play.rust-lang.org/?version=stable&mode=debug&edition=2021&gist=6a1428d9cae5b9343b464709573648b4 [1] Run that onDebug
andRelease
builds. Notice the output is different? Don’t take that example as some sort of difficult case, you wouldn’t write this code, but the concepts in it are a bit worrisome. That code is a silly example, but each individualunsafe
block appears sound when trying to reason only within the block. There is unsafe behavior happening outside of theunsafe
blocks (thedo_some_things
function should raise eyebrows), and the function we ultimately end up in has no idea something unsafe has happened.Unsafe code in Rust is not easy, and to some extent it breaks abstractions (maybe pointers in general break abstractions to some extent?).
noaliases
in that playground code rightly assumes you can’t have a&ref
and&mut ref
to the same thing, that’s undefined behavior in Rust. Yet to understand the cause of that bug you have to look at all function calls on the way, just as you would have to in C, and one of the biggest issues in the code exists outside of anunsafe
block.[1]: If you don’t want to click that link or it breaks, here is the code:
fn uhoh() { let val = 9; let val_ptr: *const usize = &val; do_some_things(val_ptr); println!("{}", val); } fn do_some_things(val: *const usize) { let valref = unsafe { val.as_ref().unwrap() }; let mut_ptr: *mut usize = val as *mut usize; do_some_other_things(mut_ptr, valref); } fn do_some_other_things(val: *mut usize, normalref: &usize) { let mutref = unsafe { val.as_mut().unwrap() }; noaliases(normalref, mutref); } fn noaliases(input: &usize, output: &mut usize) { if *input < 10 { *output = 15; } if *input > 10 { *output = 5; } } fn main() { uhoh(); }
having to go out of your way to learn it and religiously implement it.
Look! I painted the mona lisa in ketchup.
I think most people would agree with you, but that isn’t really the issue. Rather the question is where the threshold for rewriting in Rust vs maintaining in C lies. Rewriting in any language is costly and error-prone, so at what point do the benefits outweigh that cost and risk? For a legacy, battle-tested codebase (possibly one of the most widely tested codebases out there), the benefit is probably on the lower side.
Isn’t that exactly the strawman the maintainer got tired of?
Hmm… I admit I didn’t follow the video and who was speaking very well and didn’t notice hostility that others seem to pick up on. I’ve worked with plenty of people who turn childish when a technical discussion doesn’t go their way, and I’ve had the luxury of mostly ignoring them, I guess.
It sounded like he was asking for deeper specification than others were willing or able to provide. That’s a constant stalemate in software development. He’s right to push for better specs, but if there aren’t any then they have to work with what they’ve got.
My first response here was responding to the direct comparison of languages, which is kind of apples and oranges in this context, and I guess the languages involved aren’t even really the issue.
Part of the hostility was the other maintainer misunderstanding the presenter, going on a diatribe about how the kernel Rust maintainers are going to force the C code to become unrefactorable and stagnate, and rudely interrupting the presenter with another tangent whenever he (the presenter) tried to clarify anything.
An unpleasant mix of DM railroading and gish galloping, essentially.
I wouldn’t quite call it a strawman, but the guy was clearly not engaging in good faith. He made up hypothetical scenarios that nobody asked about, and then denigrated Rust by attacking the scenarios he came up with.
He made up hypothetical scenarios that nobody asked about, and then denigrated Rust by attacking the scenarios he came up with.
This seems to be the textbook description of a strawman argument.
Wait, yeah. I was thinking of ad hominem when i wrote that, sorry. Correct, that is a strawman.
If the timeline is long enough then it’s always worth the refactor.
Seeing as how 40% of the security issues that have been found over the years wouldn’t exist in a memory-safe language, I would say a re-write is extremely worth it.
Most reasonable people say c is good, rust is better
From other discussions I’ve seen, the guy stepping down was frustrated by having C code rejected that made lifetime guarantees more explicit. No rust involved. The patch was in service of rust bindings, but there was 0 rust code being reviewed by maintainers.
Some next level deaf going on. That’s not what was being discussed.
The defensiveness proves just how out of touch and unqualified to comment some people are.
This is a little off topic and admittedly an oversimplification, but people saying Rust’s memory safety isn’t a big deal remind me of people saying static typing isn’t a big deal.
Totally
Who the fuck is this little shit? Can’t they even be a little considerate towards rust? Just because they have 15 years worth of inertia for C doesn’t mean they can close their eyes and say “nope, I’m not interested”. I do not see how the kernel can survive without making rust a first class citizen
It’s Ted Ts’o, the maintainer of the ext4 filesystem amongst other things.
little shit
Though you’re still accurate despite his seniority.
There’s really only one valid response to Ted Ts’o:
If you think you can do better with C, prove it.
Somebody needs to send a public email to the kernel mailing lists with this
You seem really invested in pointing out those shortcomings. I respect that.
Arrogant hypocrites are a pet peeve of mine. If someone is going to act like progressive technology changes are beneath them and unnecessary, they should be able to put their money where their mouth is.
How many vulnerabilities have the kernel Rust team introduced in the same time period on the same code?
Let me know when you find one?
Memory ownership isn’t the only source of vulnerabilities. It’s a big issue, sure, but don’t think rust code is invulnerable.
Of course. Rust isn’t immune to logic errors, off-by-one mistakes, and other such issues. Nor is it memory safe in
unsafe
blocks.Just by virtue of how memory safety issues account for 50%+ of vulnerabilities, it’s worth genuinely considering as long as the bindings don’t cause maintainability issues.
The bindings cause maintainability issues. That’s the problem.
3min 30s, sample for context
If you keep watching for 10 minutes, it’s an interesting discussion. Too bad they had to cut it short due to time.