-
Notifications
You must be signed in to change notification settings - Fork 256
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Disable SIMD with a feature #202
Comments
Greetings! AFAIK SIMD instructions and feature detection on x86 do not need OS support. Can you please clarify what do you mean by lack of SIMD support? Adding a feature for enforcing software implementation should not be hard and it also may be useful for reducing final binary size a bit. |
It would probably make more sense to have a (potentially on-by-default) feature for SIMD that could be disabled, rather than taking away functionality with a "feature". |
The main problem with such approach is that it becomes effectively impossible to disable this feature if the crate is used as an indirect dependency somewhere in a project dependency tree, since people often don't bother with |
Thanks for the quick response! From OSDev - SSE
Since SIMD support is not critical to our paper, our implementation is still in the early stages of discussion. |
Note that by default Rust compiler enables SSE2 for x86-64 builds. I thought you plan to use |
Yes, we are using We are currently developing a userspace TPM driver that uses |
Hi!
We are developing a new research OS. Even though our OS runs on x86, it currently doesn't support SIMD instructions. It would be nice if there's a feature that allows us to disable the usage of SIMD instructions and use the software implementation instead.
hashes/sha2/src/sha256.rs
Lines 153 to 157 in bb71874
The text was updated successfully, but these errors were encountered: