Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider rust's strict_provenance? #2019

Open
rujialiu opened this issue Sep 16, 2023 · 1 comment
Open

Consider rust's strict_provenance? #2019

rujialiu opened this issue Sep 16, 2023 · 1 comment

Comments

@rujialiu
Copy link

Someone told me today that we should not assume C's size_t and rust's usize should be able to hold pointers because this is not the case on some emerging architectures (https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-947.pdf). Rust has a tracking issue on strict_provenance (rust-lang/rust#95228) that seems to be related to this kind of complexity, but it looks too complex to me, and it might be too early to consider this, but I think it's a good thing to make the code more clear/reliable and ready to new architectures. So I'm opening this issue in case anyone is interested in.

@rujialiu
Copy link
Author

Looking at the projects that mentioned that rust issue, I found https://github.com/google/zerocopy quite interesting. The codes that I debugged a lot during porting to 32-bit, is somewhat similar to what zerocopy tries to do. While we don't neccesary need to use it directly, we can follow its development

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant