People
Activity
  • Apr 04 10:57
    dhardy synchronize #765
  • Apr 04 09:51
    dhardy commented #765
  • Apr 04 09:49
    dhardy synchronize #765
  • Apr 03 14:23
    dhardy commented #765
  • Apr 03 14:23
    dhardy synchronize #765
  • Apr 03 14:16
    dhardy commented #765
  • Apr 03 13:59
    newpavlov commented #765
  • Apr 03 13:39
    hmble commented #744
  • Apr 03 11:41

    alexcrichton on gh-pages

    Documentation for rust-random/r… (compare)

  • Apr 03 11:25

    dhardy on master

    Simplify ::test::rng function Add rand_distr crate The lib.r… Move uniformity tests to rand_d… and 9 more (compare)

  • Apr 03 11:25
    dhardy closed #761
  • Apr 03 11:25
    dhardy commented #761
  • Apr 03 09:00
    dhardy synchronize #761
  • Apr 03 08:34
    dhardy commented #761
  • Apr 03 08:29
    dhardy synchronize #765
  • Apr 03 08:21
    dhardy edited #765
  • Apr 02 23:05

    Kimundi on gh-pages

    Documentation for rust-lang-nur… (compare)

  • Apr 02 23:04

    alexcrichton on gh-pages

    Documentation for rust-lang-nur… (compare)

  • Apr 02 23:03

    alexcrichton on gh-pages

    Documentation for rust-lang-nur… (compare)

  • Apr 02 22:32
    jasonbking commented #761
Peter Atashian
@retep998
There are crates which do a better job of providing a page allocator such as https://github.com/ezrosent/allocators-rs/tree/master/mmap-alloc
I have expressed a desire in the past for memmap to offer an API specialized for page allocation, but the only thing I recall coming out of those discussions was that memmap would stick to just providing cross platform memory mapped files, which has absolutely nothing to do with page allocation (aside from using the same syscall on linux)
Dan Burkert
@danburkert
that's a pretty big 'nothing'
but I agree, that API does seem better for pure allocation usecases
Peter Atashian
@retep998
Can you find any examples of usecases where someone needs to change the protection on a memory mapped file?
Dan Burkert
@danburkert
only issue I see is that it's wildly unsafe, and it's easy to misuse such that you will crash on windows, but be merely slow on unix
Nothing realistic off the top of my head
Peter Atashian
@retep998
I'm sure it is possible to design a safer API
Dan Burkert
@danburkert
perhaps it would be better for the community to solidify around mmap-alloc for allocation, and create a new crate (mmap-file) for file IO
actually I take that back. I think it's pretty common to have a file which you write to for a time, and then switch to be read-only
Peter Atashian
@retep998
Perhaps you can expose an API which only allows downgrading the protections
Dan Burkert
@danburkert
Yeah, we could always add promotion back later if it proves to be necessary
good idea
Peter Atashian
@retep998
And it's pretty trivial to just open up a new memory mapped file with more rights if you need to
I assume linux will share physical memory for multiple mappings of the same file?
Dan Burkert
@danburkert
Not entirely sure. I'm going to play around with just remapping the file on Windows for the pemission upgrade situation, if that works then it seems harmless enough
Zach Miller
@zachmse
@danburkert @retep998 Just now getting a chance to check the messages for the day. I like the idea of only providing a downgrade API / remapping the file to upgrade permissions.
@danburkert I will be pretty busy this next few days, but should have some time to play around with this over the weekend.
Ashley Mannix
@KodrAus
Hey all! We could use a hand in mio to get the Android build working again. It's containerised so you should only need docker. If you're familiar with the Android SDK that might help
Ashley Mannix
@KodrAus
:arrow_up: This isn't an issue with mio itself, it's just the android sdk not setting up properly. So it might be a quick-win
Ashley Mannix
@KodrAus
@bobbo thanks for opening up the tracking issue for num_cpus! I've posted them to This Week in Rust so they should show up in the next issue, but I don't think they'll last too long. Thanks again for running this evaluation :)
I need to open up some tracking issues for semver. I'll leave it for a few days in case anyone has any last minute feedback then open them up. We can always flesh out some of the bigger things more in GitHub issues
Steve Klabnik
@steveklabnik
:D
Zach Miller
@zachmse
@danburkert have you had a chance to give any more thought to the API changes necessary for memmap? @KodrAus suggested that it might be good to create an issue on the memmap Github indicating that a refactoring needs to be performed. I am more than happy to do this, but would like to get your thoughts first. Also, if there is anyway I can help feel free to let me know!
Ashley Mannix
@KodrAus
Hi all! I've opened up tracking issues for steveklabnik/semver-parser#24 and steveklabnik/semver#139. Some of the issues are nice and simple and some are bigger and need your input :)
Steve Klabnik
@steveklabnik
:confetti_ball:
Dan Burkert
@danburkert
@bjnyfv finally got some time to finish up that PR. The workarounds required for Windows aren't pretty, but they get the job done
David Futcher
@bobbo
All quiet on the Libz-Blitz front recently; I've largely finished up the num_cpus evaluation and have been working on some of the semverissues. Happy to lead another evaluation or hear about any other crates needing work
Ashley Mannix
@KodrAus
@danburkert :tada: That's great news!
@bobbo yeh it has been a bit quiet recently. Hopefully we can get some attention on those bigger semver issues. Thanks for taking on the privacy one! If you'd like to lead another evaluation please feel free to kick one off! All the crates in the WG doc should have go ahead from the author, but it's probably worth reaching out first
Dan Burkert
@danburkert
Alright, just cut a 0.6 release of memmap with the new API changes, and sent out a bunch of PRs to downstream crates. Other than code-reviews, I probably won't have much time to take on any other things with memmap for a while. I think it's getting in to pretty good shape, though
Dzmitry Malyshau
@kvark
Hello WG libz blitz!
Who and how decides if a library needs to be focused on (or at least looked at) by the group?
Aaron Turon
@aturon
@kvark in general, we’re pretty open to people running evaluations on libraries they think are worthwhile!
however, to be an “official” part of the blitz, the evaluation needs to be presented to the libs team and reach consensus there
Dzmitry Malyshau
@kvark
@aturon is there an assumption that a library is at least somewhat close to being stable?
Aaron Turon
@aturon
yes
in some cases there are some open design questions
but the process isn’t suited for really open-ended exploration
Dzmitry Malyshau
@kvark
gfx-hal is in a non-trivial position here. I believe it's a foundational rust library that needs to be available to anyone. At the same time, it's not close to being stable now. Would the group consider having a preliminary look at it to give us early feedback on the stabilization path?
Aaron Turon
@aturon
@kvark hm so in that case, i’d recommend one of two possible paths:
1) you could start an internals thread to get feedback on the library and talk about open issues, trying to suss out a direction
2) you could spin up something like WG-libs-rand, which is a working group specifically dedicated to resolving the open design and impl issues around the rand crate
Dzmitry Malyshau
@kvark
@aturon thanks for the answer! How would 2) be different from just people coming to our gitter and discussing the issues there?
Aaron Turon
@aturon
@kvark it’s not, really :-) basically, i’d be happy to direct folks that way!
Dzmitry Malyshau
@kvark
what sort of folks, and through what means of communication would you direct to us?
Dzmitry Malyshau
@kvark
@aturon ^
Aaron Turon
@aturon
@kvark folks being the Rust community at large, venue being things like the impl period newsletter
Dzmitry Malyshau
@kvark
@aturon ok. We'll greatly appreciate being mentioned in the newsletter. Our main gitter is https://gitter.im/gfx-rs/gfx , although I can create a specific room for blitz if you can see it appropriate. Thank you!
Ashley Mannix
@KodrAus
Thanks for the awesome work everyone! Just because the impl period has come to a close doesn't mean we won't have more to do here :) There's still plenty of opportunities in rayon, mio, semver and semver_parser. I'm excited to see all these libraries hit 1.0 in the future
Steve Klabnik
@steveklabnik
same :)