this post was submitted on 31 May 2024
304 points (98.4% liked)

Linux

45457 readers
1401 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 32 points 1 month ago (13 children)

This is a use-after-free, which should be impossible in safe Rust due to the borrow checker. The only way for this to happen would be incorrect unsafe code (still possible, but dramatically reduced code surface to worry about) or a compiler bug. To allocate heap space in safe Rust, you have to use types provided by the language like Box, Rc, Vec, etc. To free that space (in Rust terminology, dropping it by using drop() or letting it go out of scope) you must be the owner of it and there may be current borrows (i.e. no references may exist). Once the variable is droped, the variable is dead so accessing it is a compiler error, and the compiler/std handles freeing the memory.

There's some extra semantics to some of that but that's pretty much it. These kind of memory bugs are basically Rust's raison d'etre - it's been carefully designed to make most memory bugs impossible without using unsafe. If you'd like more information I'd be happy to provide!

[–] [email protected] 0 points 1 month ago (4 children)

The way I understand it, it is a bug in C implementation of free() that causes it to do something weird when you call it twice on the same memory. Maybe In Rust you can never call free twice, so you would never come across this bug. But, also Rust probably doesn't have the same bug.

My point is it seems it is a bug in the underlying implementation of free(), not to be caught by the compiler, and can't Rust have such errors no matter its superior design?

[–] [email protected] 9 points 1 month ago (1 children)

Not really, the issue is that C/C++ is not memory safe, i.e. it allows you to access memory that has already been freed. Consider the following C++ code:

int* wrong() {
  int data  = 10;
  return &data;
}

If you try to use it it looks correct:

int* ptr = wrong();
std::cout << *ptr << std::endl;

That will print 10, but the memory where data was defined has been freed, and is no longer in control of the program. Meaning that if something else allocated that memory they can control what my program does.

Consider that on that example above later in the program we do:

user.access_level = *ptr;

If someone manages to get control of that memory between when we freed it and we used it they can make the access_level of the user be whatever they want.

This is a problem with C/C++ allowing you to access memory that has been freed, which is why C/C++ programmers need to be extra careful.

[–] [email protected] 3 points 1 month ago

Thank you, that is very clear.

load more comments (2 replies)
load more comments (10 replies)