linux
unsafe-code-guidelines
linux | unsafe-code-guidelines | |
---|---|---|
9 | 74 | |
240 | 640 | |
0.8% | 1.3% | |
0.0 | 6.9 | |
9 months ago | about 2 months ago | |
C | ||
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
linux
-
Committing to Rust for Kernel Code
> Torvalds answered that, while he used to find problems in the LLVM Clang compiler, now he's more likely to find problems with GCC instead; he now builds with Clang.
https://github.com/ClangBuiltLinux/linux/issues is our bug tracker for known issues (a few are tracked in llvm's issue tracker). Bug reporters and future kernel hackers wanted!
As I mentioned on mastodon, there's lots of bugs still to be fixed everywhere, but even if we don't fix them, providing competition in the toolchain space has been worth it to users.
-
ISO C became unusable for operating systems development
Linux builds on clang after a decade of dedicated effort to make it happen, and that is with clang overall being comparatively similar to gcc (e.g clang implements many gcc extensions): https://github.com/ClangBuiltLinux/linux/wiki/Project-histor...
-
What (not how) to contribute to the kernel
We got plenty of bugs for building the kernel with LLVM, if you're looking for tasks, pick one!
-
Intel C/C++ compilers complete adoption of LLVM
There's an semi-official github[0] for this.
AFAICT from the issue, Clang and binutils/LLVM tools work fine with no patches for the mainstream archs and when not trying to be super-fancy with custom flags. The more non-mainstream one goes with arch or flags the more likely one will run into something.
[0] https://github.com/ClangBuiltLinux/linux/issues
- Is linux insecure?
-
Kernel 5.12.0 clang LTO
If you have any reproducible issues please file them here: https://github.com/ClangBuiltLinux/linux/issues
-
Looking for advice on learning kernel development
See if you can build your distro's config. make LLVM=1 localmodconfig olddefconfig bzImage. Any warnings? Any warnings not in the issue tracker? If not, pick one from the issue tracker and see if you can reproduce it. Note: lots of issues are tagged by target ISA, so you'll need to get familiar with cross compiling (setting ARCH= and CROSS_COMPILE=.
-
Why Apple Chose Clang
It's a pipeline; clang starts, hands off to LLVM.
For a compilation to object file from source code, the vast majority of time for most translation units is spent in the front end of the pipeline, not the middle, or backend.
See also my first plot: https://github.com/ClangBuiltLinux/linux/issues/1086#issueco...
unsafe-code-guidelines
-
Passing nothing is surprisingly difficult
Useful context on the Rust side is this issue [1]. It sounds like some of the author's concerns are addressed already.
[1]: https://github.com/rust-lang/unsafe-code-guidelines/issues/4...
-
Blog Post: Non-Send Futures When?
Is this captured by one of the known soundness conflicts? If not then should consider adding it to the list.
- Are crates like vcell and volatile cell still unsound?
-
Question: Are there things for Unsafe Rust learn from Zig?
There are some competing proposals for different memory models. Stacked borrows is the current proposal, but there are more work in the approproate WG.
-
Let's thank who have helped us in the Rust Community together!
Thank you /u/RalfJung for bringing formal methods to Rust, both through models like Stacked Borrows, by developing miri, and by working on unsafe-code-guidelines which aims to specify exactly what is and isn't allowed in unsafe code (surprisingly, it's an open question as 2023!)
- Questions about ownership rule
-
Noob Here: Why doesn't this work?
You could imagine some way to make this safe for example automatically convert &'short &'long mut T to &'short &'short T, but it's non-trivial to prove they are safe at all, not to mention ensuring this is correctly implemented in the compiler. If you're interested there's also a discussion on whether the opposite (& & T to & &mut T) is sound here.
-
When Zig is safer and faster than (unsafe) Rust
Agreed! MIRI is so good, it still feels like magic to me. It also comforts me that the Rust team takes improving unsafe semantics seriously, with the past Unsafe Code Guidelines WG and today's operational semantics team (t-opsem).
-
Safety and Soundness in Rust
I think there are some aspects of this rule that are still undecided. See for example:
- https://github.com/rust-lang/unsafe-code-guidelines/issues/8...
- https://github.com/rust-lang/miri/issues/2732
-
I wanna be a crab.
C is much better specified than unsafe Rust. Some things are just not worked out yet in Rust. This may sometimes even bite very experienced devs, such as this issue with Box's aliasing semantics, which tripped up the author of left-right.
What are some alternatives?
wasi-sdk - WASI-enabled WebAssembly C/C++ toolchain
tokio - A runtime for writing reliable asynchronous applications with Rust. Provides I/O, networking, scheduling, timers, ...
checkedc - Checked C is an extension to C that lets programmers write C code that is guaranteed by the compiler to be type-safe. The goal is to let people easily make their existing C code type-safe and eliminate entire classes of errors. Checked C does not address use-after-free errors. This repo has a wiki for Checked C, sample code, the specification, and test code.
rust - Empowering everyone to build reliable and efficient software.
tilck - A Tiny Linux-Compatible Kernel
rfcs - RFCs for changes to Rust
gentooLTO - A Gentoo Portage configuration for building with -O3, Graphite, and LTO optimizations
x11rb - X11 bindings for the rust programming language, similar to xcb being the X11 C bindings
freebsd-ports - FreeBSD ports tree (read-only mirror)
bevy - A refreshingly simple data-driven game engine built in Rust
gcc
miri - An interpreter for Rust's mid-level intermediate representation