Get the latest tech news

Show HN: I built a Rust crate for running unsafe code safely


Run unsafe code safely. Contribute to brannondorsey/mem-isolate development by creating an account on GitHub.

mem-isolate uses this implementation detail as a nifty hack to provide a callable function with a temporary and isolated memory space. You can think of this isolation almost like a snapshot is taken of your program's memory at the time execute_in_isolated_process() is called, which will be restored once the user-supplied callable function has finished executing. Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you shall be dual licensed as above, without any additional terms or conditions.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of unsafe code

unsafe code

Photo of Rust crate

Rust crate

Related news:

News photo

An Alternative to Rewriting Memory-Unsafe Code in Rust: the 'Safe C++ Extensions' Proposal

News photo

Google's Rust belts bugs out of Android, helps kill off unsafe code substantially

News photo

A library to assist writing memory-unsafe code in "pure" Python