Big ask with no warning. Kind of rude, really. A bit odd that one guy can leverage a key component this way?How is a random architecture's maintainer supposed to come up with a Rust toolchain in 6 months
Big ask with no warning. Kind of rude, really. A bit odd that one guy can leverage a key component this way?How is a random architecture's maintainer supposed to come up with a Rust toolchain in 6 months
If I recall correctly, Ubuntu is based on Debian.I am surprised by that, too.
Now I imagine Debian ended up with systemd in a similar way.
Even if doing so, things like "run Linux on Bhyve", "run Linux on emulators/something" and "porting Linux apps to FreeBSD" would remain here.Might be worth creating a "Linux" forum so that all linux related discussions can be corralled there. Sorta like The Unix-Haters Handbook![]()
As long as there is a FreeBSD/bhyve/linux emulation connection, that is fine and in fact should have a place other than off-topic! But may be discussing the finer points of systemd and other such linux specific stuff can go in a linux forum!Even if doing so, things like "run Linux on Bhyve", "run Linux on emulators/something" and "porting Linux apps to FreeBSD" would remain here.![]()
Just an idea (not sure possible / meaningful enough or not), but "Implement BSD-licensed systemd emulator to be startup from rc.d scripts" could be a candidate for kinda GSoC to ease porting interesting new softwares?But may be discussing the finer points of systemd and other such linux specific stuff can go in a linux forum!
This is what the DoD says: https://media.defense.gov/2025/Jun/...RABILITIES_IN_MODERN_SOFTWARE_DEVELOPMENT.PDFThere seem to be FUDs (i.e., by US gov.) that all projects SHALL switch to memory-safe languages.
The goal of these documents is to strengthen national cybersecurity by reducing memory-related vulnerabilities, which requires more than developer discipline and best practices. Achieving better memory safety demands language-level protections, library support, robust tooling, and developer training. While decades of experience with nonMSLs have shown that secure coding standards and analysis tools can mitigate many risks, they cannot fully eliminate memory safety vulnerabilities inherent to these languages as effectively as the safeguards used in MSL.
...
MSLs such as Ada, C#, Delphi/Object Pascal, Go,Java, Python, Ruby, Rust, and Swift offer built-in protections against memory safety issues, making them a strategic choice for developing more secure software.
Conclusion
Memory vulnerabilities pose serious risks to national security and critical infrastructure. MSLs offer the most comprehensive mitigation against this pervasive and dangerous class of vulnerability. Adopting MSLs can accelerate modern software development and enhance security by eliminating these vulnerabilities at their root.