Yeah, with which nobody can agree on how to manage memory.entire computing platform

Looking at these GSP binariesThat's objectively false.

Yeah, with which nobody can agree on how to manage memory.entire computing platform
Looking at these GSP binariesThat's objectively false.
Yeah, maybe my memory's faulty, but I thought it was C++. That's still a weird stack Obj-C -> C -> C++.
So does the V language. Example:
//C function declaration in V
fn C.select(ndfs int, readfds &C.fd_set, writefds &C.fd_set, exceptfds &C.fd_set, timeout &C.timeval) int
....
res := C.select(fd + 1, &read_set, C.NULL, C.NULL, &ts)
Out of interest, do you know Apple's rationale back then for choosing C++ for DriverKit and writing specific macOS userspace drivers?There also was "Objective-C++", which allowed some early C++ constructs in Objective-C. I forgot when and where that was introduced.
Just seen in that same discussion that they will also be "publishing the same demo with Sqlite and Quake translations.".
Out of interest, do you know Apple's rationale back then for choosing C++ for DriverKit and writing specific macOS userspace drivers?
It feels like a strange choice, considering their ecosystem. It looks to be vanilla C++ too (albeit freestanding, without STL), rather than with Obj-C++ extensions.
And if you are thinking that tagged pointers do not require any C code to be rewritten you are likely going to be disappointed.
They are not comparable. Using capabilities is like wearing seatbelts -- to protect you against unforeseen "runtime" events. Using a better language is like strictly following best practices in a factory to build a safer car. Just explaining the difference, not arguing for Rust in kernel.My point is that the cost of compartmentalizing an existing C/C++ codebase (or parts of it) in capability mode is far less economically taxing than rewriting swaths of drivers/applications in a completely foreign (and arguably unnecessary) language.
Probably because other people write drivers in C++.Out of interest, do you know Apple's rationale back then for choosing C++ for DriverKit and writing specific macOS userspace drivers?
It feels like a strange choice, considering their ecosystem. It looks to be vanilla C++ too (albeit freestanding, without STL), rather than with Obj-C++ extensions.
This would indicate that Rust is NOT safe for every aspects.Here is a CVE in a Rust library that can lead to remote code execution. To make things worse, the official crates contain several forks of the library with the error, at least one popular one of which is unmaintained since 2023 and doesn't have the fix.
Meet tarmageddon
![]()
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
High-severity TARmageddon flaw (CVE-2025-62518) in Rust’s async-tar libraries enables RCE via header parsing bug.thehackernews.com
And also means crate is BAD. It should be maintained (approval by Rust dev authoritatitives on adding / modifying should be forced).
If Rust does NOT state it is for (memory) safety, I wouldn't have said as such.It is an interesting question whether you should kick out libraries that are unmaintained and known vulnerable.
Doing the kickout would make all projects using the library (even as an indirect dependency) fail to compile.
What's making things worse is that many "non-professional nor non-enthusiast" users would be thinking "Rust is safe for every vulnerabilities!", even though Rust guys states "memory safe" only.npm highlights if a dep is vulnerable or unmaintained. But its so common that people ignore it and pull crap in regardless. I imagine crates.io will be a similar thing once it matures.
Indeed, much of the Rust community really have no idea what they are talking about. They just repeat the words of their favorite youtuber. However, those in the Rust community who are experienced and knowledgeable have always been very clear about Rust's key focus being memory safety. Unfortunately, this often does get lost through all the noise though.What's making things worse is that many "non-professional nor non-enthusiast" users would be thinking "Rust is safe for every vulnerabilities!", even though Rust guys states "memory safe" only.
This is a hard one. Maybe there are four approaches:So crates should be managed by Rust devs to be safe, or Rust devs stop stating about safety.
I think I see what you mean. Or at least perhaps just more education as to how an unsafe block can pose more of a risk throughout the codebase than what is simply between the bracers.But the first step should be dropping UNSAFE block and reintroduce it (or its successor) only for defining interfaces against other memory-unsafe languages like C and asm, to make "actial" codes written in Rust to be assured "memory safe" by prohibiting to write memory unsafe codes. It should mean Rust to be Turing-incomplete, though.
Nothing makes ports more or less special than npm or crates when it comes to deciding who to trust.
Nothing makes ports more or less special than npm or crates when it comes to deciding who to trust.
It's what I fear, which usually does NOT applicable with FreeBSD ports.It is my understanding that npm usually allows the author to make changes (updates) on their own.