From BeepingComputer.

    • GreyBeard@lemmy.one
      link
      fedilink
      arrow-up
      63
      arrow-down
      1
      ·
      1 year ago

      It’s certainly why it is being used to build browsers and OSs now. Those are places were memory management problems are a huge problem. It probably doesn’t make sense for every match 3 game to be made in Rust, but when errors cause massive breaches or death, it’s a lot safer than C++, taking human faulability into account.

      • AggressivelyPassive@feddit.de
        link
        fedilink
        arrow-up
        22
        arrow-down
        1
        ·
        1 year ago

        Question would be rather: why is something like C++ needed for such simple apps?

        C++ seems to be in that weird in-between place of offering high level features to be reasonable productive, but still doesn’t enforce/guarantee anything to make these features safe. I’d argue, very few programs need that. Either you’re writing business stuff, then you want safety (Java, C#, rust), or you’re writing embedded/low level stuff, then you want control (C, ASM).

        The room for “productive, but not interested in safety” is basically just AAA games, I guess.

        • intelati@programming.dev
          link
          fedilink
          arrow-up
          11
          arrow-down
          1
          ·
          1 year ago

          C is almost the old “steady” standard now it feels like. It’s so flexible and the frameworks are already built…

          • entropicdrift@lemmy.sdf.org
            link
            fedilink
            arrow-up
            14
            ·
            1 year ago

            …except that we also end up with cracks in our foundations like this exploit constantly being exposed as a result of all that C

        • teawrecks@sopuli.xyz
          link
          fedilink
          arrow-up
          7
          ·
          1 year ago

          Well you’re not going to write asm if you want your code to be portable at all, and believe it or not C++ has a lot of features to help you not shoot yourself in the foot that C doesn’t have (ex. OOP, RAII, smart pointers).

          C wasn’t really designed with dynamic memory management in mind. It was designed for someone who has absolute control over a machine and all the memory in it. malloc() and free() are just functions that some environments expose to user mode processes, but C was never designed to care where you got your memory or what you do with it.

        • lloram239@feddit.de
          link
          fedilink
          arrow-up
          11
          ·
          edit-2
          1 year ago

          C has no memory protection. If you access to the 10th element of a 5 element array, you get to access whatever is in memory there, even if it has nothing to do with that array. Furthermore this doesn’t just allow access to data you shouldn’t be able to access, but also the execution of arbitrary code, as memory doesn’t make a (big) difference between data and code.

          C++ provides a few classes to make it easier to avoid those issues, but still allows all of them.

          Ruby/Python/Java/… provide memory safety and will throw an exception, but they manually check it at runtime, which makes them slow.

          Rust on the other side tries to proof as much as it can at compile time. This makes it fast, but also requires some relearning, as it doesn’t allow pointers without clearly defined ownership (e.g. the classic case of keeping a pointer to the parent element in a tree structure isn’t allowed in Rust).

          Adding the safeties of Rust into C would be impossible, as C allows far to much freedom to reliably figure out if a given piece of code is safe (halting problem and all that). Rust purposefully throws that freedom away to make safe code possible.

        • ziviz@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          7
          ·
          1 year ago

          The short answer is Rust was built with safety in mind. The longer answer is C was built mostly to abstract from assembly without much thought to safety. In C, if you want to use an array, you must manually request a chunk of memory, check to make sure you are writing within the bounds of your array, and free up the memory used by your array when completely done using it. If you do not do those steps correctly, you could write to a null pointer, cause a buffer overflow error, a use-after-free error, or memory leak depending on what step was forgotten or done out of order. In Rust, the compiler keeps track of when variables are used through a borrowing system. With this borrowing system the Rust compiler requests and frees memory safely. It also checks array bounds at run-time without a programmer explicitly needing to code it in. Several high-level languages have alot of these safety features too. C# for example, can make sure objects are not freed until they fall out of scope, but it does this at run-time with a garbage collector where Rust borrower rules are done at compile-time.

          • Affine Connection@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            1 year ago

            C was built mostly to abstract from assembly

            That’s actually not true; rather, many modern architectures are designed to allow languages like C to be compiled more easily. Old architectures don’t even have a built-in stack.

        • Michael Murphy (S76)@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          1 year ago

          The compiler enforces “aliasing XOR mutability”; utilizes “move semantics”; has a “borrowing and ownership” model; and requires the programmer to tag their references with “lifetimes”. Array accesses are checked at runtime if they cannot be guaranteed safe at compile-time. Variables passed by value (moved) cannot be reused. Variables cannot be moved or mutated if any borrow to them exists. You may either have only one mutable borrow, or many immutable borrows, but never both. Therefore you cannot mutate an array while iterating on it, and you cannot have two separate unchecked references to the same array. Every function or type that accepts a borrow must be able to annotate the lifetimes of references to ensure that references are always dropped in the correct order to prevent dangling references. Rust requires developing software with discipline using patterns that satisfy all of these constraints.

      • AggressivelyPassive@feddit.de
        link
        fedilink
        arrow-up
        51
        arrow-down
        2
        ·
        1 year ago

        But it’s harder and easier to spot.

        You’ll never be 100% safe, but a proper lock is better than a “plz no steal” note.

      • lloram239@feddit.de
        link
        fedilink
        arrow-up
        6
        arrow-down
        1
        ·
        1 year ago

        Dumb stuff in Rust has to be explicitly marked with unsafe. Meaning if you review the code you have to focus on only a couple of lines instead of the whole project.

        You can of course still write lots of other bugs in Rust, but C-style buffer overflows are impossible in Rust, which eliminates the majority of security issues.