Big ask with no warning. Kind of rude, really. A bit odd that one guy can leverage a key component this way?How is a random architecture's maintainer supposed to come up with a Rust toolchain in 6 months
Big ask with no warning. Kind of rude, really. A bit odd that one guy can leverage a key component this way?How is a random architecture's maintainer supposed to come up with a Rust toolchain in 6 months
If I recall correctly, Ubuntu is based on Debian.I am surprised by that, too.
Now I imagine Debian ended up with systemd in a similar way.
Even if doing so, things like "run Linux on Bhyve", "run Linux on emulators/something" and "porting Linux apps to FreeBSD" would remain here.Might be worth creating a "Linux" forum so that all linux related discussions can be corralled there. Sorta like The Unix-Haters Handbook![]()
As long as there is a FreeBSD/bhyve/linux emulation connection, that is fine and in fact should have a place other than off-topic! But may be discussing the finer points of systemd and other such linux specific stuff can go in a linux forum!Even if doing so, things like "run Linux on Bhyve", "run Linux on emulators/something" and "porting Linux apps to FreeBSD" would remain here.![]()
Just an idea (not sure possible / meaningful enough or not), but "Implement BSD-licensed systemd emulator to be startup from rc.d scripts" could be a candidate for kinda GSoC to ease porting interesting new softwares?But may be discussing the finer points of systemd and other such linux specific stuff can go in a linux forum!
This is what the DoD says: https://media.defense.gov/2025/Jun/...RABILITIES_IN_MODERN_SOFTWARE_DEVELOPMENT.PDFThere seem to be FUDs (i.e., by US gov.) that all projects SHALL switch to memory-safe languages.
The goal of these documents is to strengthen national cybersecurity by reducing memory-related vulnerabilities, which requires more than developer discipline and best practices. Achieving better memory safety demands language-level protections, library support, robust tooling, and developer training. While decades of experience with nonMSLs have shown that secure coding standards and analysis tools can mitigate many risks, they cannot fully eliminate memory safety vulnerabilities inherent to these languages as effectively as the safeguards used in MSL.
...
MSLs such as Ada, C#, Delphi/Object Pascal, Go,Java, Python, Ruby, Rust, and Swift offer built-in protections against memory safety issues, making them a strategic choice for developing more secure software.
Conclusion
Memory vulnerabilities pose serious risks to national security and critical infrastructure. MSLs offer the most comprehensive mitigation against this pervasive and dangerous class of vulnerability. Adopting MSLs can accelerate modern software development and enhance security by eliminating these vulnerabilities at their root.
					
				![]()
Ubuntu Will Use Rust For Dozens of Core Linux Utilities - Slashdot
Ubuntu "is adopting the memory-safe Rust language," reports ZDNet, citing remarks at this year's Ubuntu Summit from Jon Seager, Canonical's VP of engineering for Ubuntu: . Seager said the engineering team is focused on replacing key system components with Rust-based alternatives to enhance...news.slashdot.org
Interesting thread on this subject. Some of the comments say that one of the motivations for ubuntu doing the rewrite in rust is to replace GPL C code with non-GPL rust code, and suggests IBM ("dead rat") is doing the same thing. Removing the GPL makes it (much) easier to monetize the software, of course. If I can believe the comments, the billionaire behind ubuntu is pushing rust for this reason (and why it's being pushed back up into debian).
Where I work, the organisation (and our clients) dislike GPL due to Defcon 703.But generally, a large part of organizations using FreeBSD are GPL haters.