AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Rust Backtraces and Windows Challenges
This chapter explores the complexities of backtraces in Rust on Windows, focusing on MSVC targets and the challenges of argument parsing. It also discusses a recent CVE fix related to command execution vulnerabilities while highlighting the need for improved functionality in handling arguments across different operating systems.
Jon and Ben discuss the highlights of the 1.76, 1.77, and 1.78 releases of Rust.
This episode was recorded as part of a YouTube live stream on 2024-05-18, which you can still watch.
Rustacean Station is a community project; get in touch with us if you’d like to suggest an idea for an episode or offer your services as a host or audio editor!
Result::inspect
Arc::unwrap_or_clone
std::hash::DefaultHasher
ptr::addr_eq
async fn
offset_of!
core::net
f64::round_ties_even
Mutex::clear_poison
File::create_new
static mut
unstable_features
lintcargo::
in build scriptsslice::first_chunk
Stripping debug info in release builds broke Windows.
Fixes CVE-2024-24576.
Detailed advisory, fix, and current logic.
unsafe
preconditions
impl Read for &Stdin
Error
trait implementations*128
ABI changePartialEq
-typed consts as patterns a hard errorcargo update
highlights stale dependencies.cargo
/config
filesassigning_clones
incompatible_msrv
cargo new
stopped commenting in Cargo.toml
Intro Theme: Aerocity
Audio Editing: Aerocity
Hosting Infrastructure: Jon Gjengset
Show Notes: Jon Gjengset
Hosts: Jon Gjengset and Ben Striegel
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode