miri VS too-many-lists

Compare miri vs too-many-lists and see what are their differences.

miri

An interpreter for Rust's mid-level intermediate representation (by rust-lang)

too-many-lists

Learn Rust by writing Entirely Too Many linked lists (by rust-unofficial)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
miri too-many-lists
121 219
3,955 3,018
2.3% 0.7%
10.0 0.0
7 days ago 15 days ago
Rust Rust
Apache License 2.0 MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

miri

Posts with mentions or reviews of miri. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-30.
  • Bytecode VMs in Surprising Places
    8 projects | news.ycombinator.com | 30 Apr 2024
    Miri [0] is an interpreter for the mid-level intermediate representation (MIR) generated by the Rust compiler. MIR is input for more processing steps of the compiler. However miri also runs MIR directly. This means miri is a VM. Of course it's not a bytecode VM, because MIR is not a bytecode AFAIK. I still think that miri is a interesting example.

    And why does miri exist?

    It is a lot slower. However it can check for some undefined behavior.

    [0]: https://github.com/rust-lang/miri

  • RFC: Rust Has Provenance
    3 projects | news.ycombinator.com | 31 Jan 2024
    Provenance is a dynamic property of pointer values. The actual underlying rules that a program must follow, even when using raw pointers and `unsafe`, are written in terms of provenance. Miri (https://github.com/rust-lang/miri) represents provenance as an actual value stored alongside each pointer's address, so it can check for violations of these rules.

    Lifetimes are a static approximation of provenance. They are erased after being validated by the borrow checker, and do not exist in Miri or have any impact on what transformations the optimizer may perform. In other words, the provenance rules allow a superset of what the borrow checker allows.

  • Mir: Strongly typed IR to implement fast and lightweight interpreters and JITs
    4 projects | news.ycombinator.com | 26 Dec 2023
  • Running rustc in a browser
    1 project | /r/rust | 12 Jul 2023
    There has been discussion of doing this with MIRI, which would be easier than all of rustc.
  • Piecemeal dropping of struct members causes UB? (Miri)
    1 project | /r/rust | 4 Jul 2023
    This issue has been fixed: https://github.com/rust-lang/miri/issues/2964
  • Erroneous UB Error with Miri?
    2 projects | /r/rust | 4 Jul 2023
  • I've incidentally created one of the fastest bounded MPSC queue
    8 projects | /r/rust | 26 Jun 2023
    Actually, I've done more advanced tests with MIRI (see https://github.com/rust-lang/miri/issues/2920 for example) which allowed me to fix some issues. I've also made the code compatible with loom, but I didn't found the time yet to write and execute loom tests. That's on the TODO-list, and I need to track it with an issue too.
  • Interested in "secure programming languages", both theory and practice but mostly practice, where do I start?
    2 projects | /r/ProgrammingLanguages | 17 Jun 2023
    He is one of the big brains behind Miri, which is a interpreter that runs on the MIR (compiler representation between human code and asm/machine code) and detects undefined behavior. Super useful tool for language safety, pretty interesting on its own.
  • Formal verification for unsafe code?
    2 projects | /r/rust | 16 Jun 2023
    I would also run your tests in Miri (https://github.com/rust-lang/miri) to try to cover more bases.
  • Ouroboros is also unsound
    3 projects | /r/rust | 11 Jun 2023
    You can run miri and it will tell you if the given run triggered any undefined behavior. It will not analyze it for every possible use of the code, but checking for the presence of this specific issue using it should be fairly simple.

too-many-lists

Posts with mentions or reviews of too-many-lists. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-02-19.
  • Towards memory safety with ownership checks for C
    3 projects | news.ycombinator.com | 19 Feb 2024
    You seem to have a preset opinion, and I'm not sure you are interested in re-evaluating it. So this is not written to change your mind.

    I've developed production code in C, C++, Rust, and several other languages. And while like pretty much everything, there are situations where it's not a good fit, I find that the solutions tend to be the most robust and require the least post release debugging in Rust. That's my personal experience. It's not hard data. And yes occasionally it's annoying to please the compiler, and if there were no trait constraints or borrow rules, those instances would be easier. But way more often in my experience the compiler complained because my initial solution had problems I didn't realize before. So for me, these situations have been about going from building it the way I wanted to -> compiler tells me I didn't consider an edge case -> changing the implementation and or design to account for that edge case. Also using one example, where is Rust is notoriously hard and or un-ergonomic to use, and dismissing the entire language seems premature to me. For those that insist on learning Rust by implementing a linked list there is https://rust-unofficial.github.io/too-many-lists/.

  • Command Line Rust is a great book
    4 projects | /r/rust | 8 Dec 2023
    Advent of Code was okay until I encounterd a problem that required a graph, tree or linked list to solve, where I hit a wall. Most coding exercises are similar--those requiring arrays and hashmaps and sets are okay, but complex data structures are a PITA. (There is an online course dedicated to linked lists in Rust but I couldn't grok it either). IMO you should simply skip problems that you can't solve with your current knowledge level and move on.
  • [Media] I'm comparing writing a double-linked list in C++ vs with Rust. The Rust implementation looks substantially more complex. Is this a bad example? (URL in the caption)
    6 projects | /r/rust | 7 Dec 2023
    I feel obligated to point to the original cannon literature: https://rust-unofficial.github.io/too-many-lists/
  • Need review on my `remove()` implementation for singly linked lists
    2 projects | /r/rust | 29 Nov 2023
    I started learning Rust and like how the compiler is fussy about things. My plan was to implement the data structures I knew, but I got stuck at the singly linked list's remove() method. I've read the book as well, but I have no clue how to simplify this further:
  • Factor is faster than Zig
    11 projects | news.ycombinator.com | 10 Nov 2023
    My impression from the article is that Zig provides several different hashtables and not all of them are broken in this way.

    This reminds me of Aria's comment in her Rust tutorial https://rust-unofficial.github.io/too-many-lists/ about failing to kill LinkedList. One philosophy (and the one Rust chose) for a stdlib is that this is only where things should live when they're so commonly needed that essentially everybody needs them either directly or to talk about. So, HashTable is needed by so much otherwise unrelated software that qualifies, BloomFilter, while it's real useful for some people, not so much. Aria cleaned out Rust's set of standard library containers before Rust 1.0, trying to keep only those most people would need. LinkedList isn't a good general purpose data structure, but, it was too popular and Aria was not able to remove it.

    Having multiple hash tables feels like a win (they're optimized for different purposes) but may cost too much in terms of the necessary testing to ensure they all hit the quality you want.

  • Was Rust Worth It?
    18 projects | news.ycombinator.com | 25 Oct 2023
    > Cyclic references can be dealt with runtime safety checks too - like Rc and Weak.

    Indeed. Starting out with code sprinkled with Rc, Weak, RefCell, etc is perfectly fine and performance will probably not be worse than in any other safe languages. And if you do this, Rust is pretty close to those languages in ease of use for what are otherwise complex topics in Rust.

    A good reference for different approaches is Learn Rust With Entirely Too Many Linked Lists https://rust-unofficial.github.io/too-many-lists/

  • What are some of projects to start with for a beginner in rust but experienced in programming (ex: C++, Go, python) ?
    3 projects | /r/rust | 31 May 2023
  • How to start learning a systems language
    7 projects | /r/rust | 17 May 2023
    Second, once you've finished something introductory like The Book, read Learning Rust With Entirely Too Many Linked Lists. It really helped me to understand what ownership and borrowing actually mean in practical terms. If you don't mind paying for learning materials, a lot of people recommend Programming Rust, Second Edition by Blandy, Orendorff, and Tindall as either a complement, follow-up, or alternative to The Book.
  • My team might work with Rust! But I need good article recommendations
    2 projects | /r/rust | 10 May 2023
  • Conversion?
    3 projects | /r/rust | 6 May 2023
    Learning Rust With Entirely Too Many Linked Lists which highlights a lot of the differences with how you need to structure your code in Rust compared to other languages.

What are some alternatives?

When comparing miri and too-many-lists you can also consider the following projects:

cons-list - Singly-linked list implementation in Rust

rust - Empowering everyone to build reliable and efficient software.

sanitizers - AddressSanitizer, ThreadSanitizer, MemorySanitizer

Rustlings - :crab: Small exercises to get you used to reading and writing Rust code!

book - The Rust Programming Language

Rust-Full-Stack - Rust projects here are easy to use. There are blog posts for them also.

CppCoreGuidelines - The C++ Core Guidelines are a set of tried-and-true guidelines, rules, and best practices about coding in C++

rfcs - RFCs for changes to Rust

easy_rust - Rust explained using easy English

nomicon - The Dark Arts of Advanced and Unsafe Rust Programming

x11rb - X11 bindings for the rust programming language, similar to xcb being the X11 C bindings