once_self_cell VS c2rust

Compare once_self_cell vs c2rust and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
once_self_cell c2rust
9 46
226 3,682
- 1.4%
6.8 9.4
2 days ago 9 days ago
Rust Rust
Apache License 2.0 GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

once_self_cell

Posts with mentions or reviews of once_self_cell. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-11.
  • Ouroboros is also unsound
    3 projects | /r/rust | 11 Jun 2023
    This issue says "Migrate code to use self_cell instead." That page says "It has undergone community code review from experienced Rust users." Looking at the review, issues were found and fixed earlier on, but my interpretation of the end of the thread is more that folks stopped responding with concerns, so confidence is now assumed but still not proven. The same was true of most (all?) other crates trying to solve the same problem, until enough people did find the unsoundness holes unique to each crate.
  • Announcing self_cell version 1.0
    2 projects | /r/rust | 29 May 2023
    I've come across the zip example bevor, and even considered adding support for mutable access to the owner here https://github.com/Voultapher/self_cell/pull/36. See the last comment why I decided not to pursue this. Looking at the specific example, really what is the purpose of storing the lazy ZipReader result? IMO that's bit of bad design on the part of the zip crate. The stdlib APIs consume reader, allowing you to abstract over creation logic. If what you need to store, needs further pre-processing, why not pull that out? Specifically here, what is the point of having a self-referential struct that contains an owner ZipArchive that you will no longer be allowed to mutate. And a lazy reader ZipReader that you can then use to really read the file? If you need to abstract over the construction logic you could return (ZipArchive, Box ZipReader>), if you want to return the content you can return (ZipArchive, Vec) allowing further use of ZipArchive.
  • Unsoundness in owning_ref
    10 projects | /r/rust | 26 Jan 2022
    As the author of self_cell I can attest, that writing unsafe lifetime abstractions is exceedingly tricky and you will get it wrong, repeatedly. I'm not sure these problems in owning_ref can be solved without a serious overhaul of the API. For one it tracks too little information, both ouroboros and self_cell independently reached the conclusion that you have to mark the dependent as either covariant or not_covariant over the owner lifetime, and prohibit ever leaking direct references if the dependent is not_covariant. But the fun doesn't stop there, if the owner can have a lifetime too, things get extra tricky. If you want to dive deeper take a look at this discussion https://github.com/Voultapher/self_cell/pull/29.
  • My experience crafting an interpreter with Rust
    2 projects | /r/rust | 22 Jul 2021
    Grouping the source and derived AST in the same struct without leaking the lifetime is something that greatly helped keep the API sane. Shameless plug https://github.com/Voultapher/self_cell
  • Safe-to-use proc-macro-free self-referential structs in stable Rust.
    4 projects | /r/rust | 13 Mar 2021
    Thanks, I'll incorporate that into https://github.com/Voultapher/once_self_cell/issues/5

c2rust

Posts with mentions or reviews of c2rust. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-10.
  • Converting the Kernel to C++
    3 projects | news.ycombinator.com | 10 Jan 2024
    A recent practical example of the former: the fish shell re-wrote incrementally from C++ to Rust, and is almost finished https://github.com/fish-shell/fish-shell/discussions/10123

    An example of the latter: c2rust, which is a work in progress but is very impressive https://github.com/immunant/c2rust

    It currently translates into unsafe Rust, but the strategy is to separate the "compile C to unsafe Rust" steps and the "compile unsafe Rust to safe Rust" steps. As I see it, as it makes the overall task simpler, allows for more user freedom, and makes the latter potentially useful even for non-transpiled code. https://immunant.com/blog/2023/03/lifting/

  • Best tools to convert code between languages?
    1 project | /r/learnprogramming | 11 Apr 2023
    But not all transpilers are between languages where at least one of them is designed to be transpiled. For example, c2rust can transpile, as the name suggests, C to (ugly, unsafe) Rust. A while ago there was a Java -> C compiler in GCC (GCJ), but it's pretty out of date now.
  • Translate C code to Rust working with libc
    1 project | /r/rust | 3 Apr 2023
    I do not know about your specific issue but you may be interested by https://github.com/immunant/c2rust
  • Rewrite in Rust or Use Rust-bindings
    1 project | /r/rust | 21 Mar 2023
    You should also consider using C2Rust (they're even working on C -> safe Rust translation)
  • Emitting Safer Rust with C2Rust
    3 projects | news.ycombinator.com | 15 Mar 2023
    > The date at the bottom of the article is 2022-06-13. Has there been further progress?

    The article links to their github repo:

    https://github.com/immunant/c2rust

    There's commits in the last hour, so at least some signal of life.

  • Writing an OS in Rust to run on RISC-V
    8 projects | news.ycombinator.com | 1 Mar 2023
    This is arguably already the state of things.

    Rust might get compiled down through MIR, down through LLVM IR, down to assembly or wasm... which then might be JIT or AOT (re)compiled into other bytecodes... which might perhaps be decompiled back up to C... and C might be retranslated back to horrific unsafe-spamming Rust by the likes of https://c2rust.com/. We've come full circle!

    The main issue is that retranslating high level languages into other high level languages isn't something that there's actually a lot of demand for, especially commercially, especially given the N x M translation matrix going on. So a lot of the projects "stabilize" (get abandoned). And automatically translating between the idioms of those languages gets even nastier in terms of matrix bloat.

    Well, you've got stuff like MSIL and JVM bytecodes which are higher level, and preserve more type information, and can be compiled to / decompiled from while still preserving more structure, but they still form competing incompatible ecosystems.

  • Will Carbon Replace C++?
    14 projects | news.ycombinator.com | 27 Feb 2023
    That's the wrong direction. What's needed are intelligent converters which convert less-strict languages to more-strict ones.

    Non-intelligent converters just make a mess. Here's c2rust.[1]

    Classic C++ to modern C++, plus a compiler flag to lock out all the old unsafe stuff, would be an achievement.

    [1] https://c2rust.com/

  • What would you rewrite in Rust?
    44 projects | /r/rust | 11 Feb 2023
  • Red Black Tree in Rust
    4 projects | /r/rust | 4 Jan 2023
    Well, technically, it's not hard to build such data structures. If you are willing to liberally use raw pointers, UnsafeCell, MaybeUninit and ManuallyDrop, then you can more-or-less write C-equivalent code in unsafe Rust. (there are even transpilers from C to Rust)
  • In Rust We Trust – A Transpiler from Unsafe C to Safer Rust
    1 project | /r/programmingcirclejerk | 5 Dec 2022
    /uj This transpiles from C to unsafe Rust using an existing tool, then strips the unsafe keyword from the generated function signatures

What are some alternatives?

When comparing once_self_cell and c2rust you can also consider the following projects:

owning-ref-rs - A library for creating references that carry their owner with them.

min-sized-rust - πŸ¦€ How to minimize Rust binary size πŸ“¦

owning-ref-unsoundness - An article explaining the unsoundness I found in owning-ref

subsurface - This is the official upstream of the Subsurface divelog program

ouroboros - Easy self-referential struct generation for Rust.

librope - UTF-8 rope library for C

rust - Empowering everyone to build reliable and efficient software.

checkedc - Checked C is an extension to C that lets programmers write C code that is guaranteed by the compiler to be type-safe. The goal is to let people easily make their existing C code type-safe and eliminate entire classes of errors. Checked C does not address use-after-free errors. This repo has a wiki for Checked C, sample code, the specification, and test code.

string - Rust String type with configurable byte storage.

zz - πŸΊπŸ™ ZetZ a zymbolic verifier and tranzpiler to bare metal C [Moved to: https://github.com/zetzit/zz]

rtorrent - rTorrent BitTorrent client

langs