Deutsch English Français Italiano |
<103392c$lpbg$5@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: The Natural Philosopher <tnp@invalid.invalid> Newsgroups: comp.os.linux.misc Subject: Re: VMS Date: Fri, 20 Jun 2025 10:19:08 +0100 Organization: A little, after lunch Lines: 48 Message-ID: <103392c$lpbg$5@dont-email.me> References: <wCqdnYde9MIbmND1nZ2dnZfqnPadnZ2d@giganews.com> <102ka4k$9umt$2@dont-email.me> <87tt4i9nw5.fsf@eder.anydns.info> <102l0h9$fjtb$5@dont-email.me> <Z2udned3u9ZgqtP1nZ2dnZfqnPudnZ2d@giganews.com> <slrn1054j9c.3ce8.candycanearter07@candydeb.host.invalid> <PpudnVnCnvuYxc_1nZ2dnZfqnPudnZ2d@giganews.com> <wwva564xjps.fsf@LkoBDZeT.terraraq.uk> <4_GdncCsf-Nqe8n1nZ2dnZfqnPSdnZ2d@giganews.com> <wwv5xgqkfl9.fsf@LkoBDZeT.terraraq.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Fri, 20 Jun 2025 11:19:09 +0200 (CEST) Injection-Info: dont-email.me; posting-host="59005c96598adc071216bb379c5cedd9"; logging-data="714096"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1943hJdC/MHrmPtl2EVAZ9Cx9Zda2p9nzo=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:XSxjc1LmZqeJgMn8d7fYMmb2YiI= In-Reply-To: <wwv5xgqkfl9.fsf@LkoBDZeT.terraraq.uk> Content-Language: en-GB On 20/06/2025 09:00, Richard Kettlewell wrote: > c186282 <c186282@nnada.net> writes: >> On 6/19/25 3:40 AM, Richard Kettlewell wrote:> >>> c186282 <c186282@nnada.net> writes: >>> IMHO, stick to 'C' ... but use GOOD PRACTICES. >>> >>> The software industry has been trying this for decades now. It does >>> not work. >> >> At some point, soon, they need to start flagging the unsafe functions >> as ERRORS, not just WARNINGS. > > The problem is not just a subset of unsafe functions. The whole language > is riddled with unsafe semantics. > > There is some movement towards fixing the easy issues, e.g. [1]. But the > wider issues are a lot harder to truly fix, so much so that one of the > more promising options is an architecture extension[2]; and there > remains considerable resistance[3] in the standards body to fixing other > issues, despite their recurring role in defects and vulnerabilities. > > [1] https://www.open-std.org/jtc1/sc22/wg14/www/docs/n3322.pdf > [2] https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/ > [3] https://www.youtube.com/watch?v=DRgoEKrTxXY > > Most languages after C designed these issues out, one way or another. > The clever bit is figuring out how to combine performance and safety, > and that’s what language designers have been working out, increasingly > successfully. > I don't really see how you can have a program that cannot write or read memory beyond the intentions of the original programmer. Sure if its a different process but simply reading one byte beyond the end of a buffer is going to be hard. And probably make the language very hard to use when you are dealing with multi-typed data. I do like, at a cursory glance, the second link. Hardware that protects memory is a great leap forward -- For every complex problem there is an answer that is clear, simple, and wrong. H.L.Mencken