-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for running under miri #32
Comments
I can do this. But I am not sure that would do what you want. Because it may mean that the check of the unsafe behavior will check different code then will actually be used when AES is available. |
Well, it's still better than no testing of anything that depends on this. |
Maybe there is a different issue here, if miri does not support aes, why is the |
Unfortunately there is no good way for Miri to influence Also see rust-lang/miri#932. |
Done: ca2f390 |
@tkaitchuck Would you mind pinging here when a new release is out with that change? |
@jonhoo version 0.3.4 includes this change |
This may be a tricky one, I'm not sure.
When running any code that uses
ahash
through miri to check for unsafe code, miri runs into issues with ahashes use of per-arch accelerated instructions likestd::arch::x86_64::_mm_aesdec_si128
. Specifically, the user ends up with an error likeWhile we could leave it to miri to mock out all of these functions, it might be easier (I don't know) for ahash to simply use the fallback hash implementation under
cfg(miri)
. I think this should just be a matter of changingaHash/src/lib.rs
Line 20 in e7a9220
and other
cfg
s like it to includenot(miri)
in theall
list./cc @RalfJung
The text was updated successfully, but these errors were encountered: