Zum Inhalt der Seite gehen


:linux: Strap in, get ready for more Rust Drivers in Linux Kernel.

Rust is alive and well in the Linux kernel and is expected to translate into noticeable benefits shortly, though its integration with the largely C-oriented codebase still looks uneasy. [The Linux and Rust communities still have some issues to work out.]

https://rust-for-linux.com/rust-kernel-policy

#linux #kernel #memory #safety #rust #drivers #it #security #privacy #engineer #media #programming #tech #news
In a hopeful coda to the recent maintainer drama that raised questions about the willingness of Linux maintainers to accommodate Rust code, Josh Aas, who oversees the Internet Security Research Group's Prossimo memory-safety project, late last week hailed Miguel Ojeda's work to advance memory safety in the kernel without mentioning the programming language schism.

<https://www.memorysafety.org/blog/linux-kernel-2025-update/>

"While our goal was never to rewrite the entire kernel in Rust, we are glad to see growing acceptance of Rust's benefits in various subsystems," said Aas. "Today, multiple companies have full time engineers dedicated to working on Rust in the Linux kernel."
Security – in the form of memory safety – is Rust's selling point.

Rust provides ways to avoid memory safety vulnerabilities that crop up in programming languages like C and C++ where manual memory management is allowed. Though other languages such as Python, Java, JavaScript, Swift and C# are also considered memory safe. Rust has received most of the memory safety evangelism, partly because it's suited for the sort of low-level, performance-sensitive code that for the past few decades has tended to be written in C and C++.

"Many of the most critical software vulnerabilities are memory safety issues in C and C++ code, and while there are ways to reduce the risk, including fuzzing and static analysis, memory safety vulnerabilities continue to plague the Internet," said Josh Aas in a write-up.

<https://www.memorysafety.org/blog/initiative-criteria/>