1.81 stabilizes the Error trait in core, allowing usage of the trait in #![no_std] libraries. This primarily enables the wider Rust ecosystem to standardize on the same Error trait, regardless of what environments the library targets.1.81 stabilizes the Error trait in core, allowing usage of the trait in #![no_std] libraries. This primarily enables the wider Rust ecosystem to standardize on the same Error trait, regardless of what environments the library targets.

The Ins and Outs of Rust 1.81.0

5 min read

The Rust team is happy to announce a new version of Rust, 1.81.0. Rust is a programming language empowering everyone to build reliable and efficient software.

\ If you have a previous version of Rust installed via rustup, you can get 1.81.0 with:

$ rustup update stable 

\ If you don't have it already, you can get rustup from the appropriate page on our website, and check out the detailed release notes for 1.81.0.

\ If you'd like to help us out by testing future releases, you might consider updating locally to use the beta channel (rustup default beta) or the nightly channel (rustup default nightly). Please report any bugs you might come across!

What's in 1.81.0 stable

core::error::Error

1.81 stabilizes the Error trait in core, allowing usage of the trait in #![no_std] libraries. This primarily enables the wider Rust ecosystem to standardize on the same Error trait, regardless of what environments the library targets.

New sort implementations

Both the stable and unstable sort implementations in the standard library have been updated to new algorithms, improving their runtime performance and compilation time.

\ Additionally, both of the new sort algorithms try to detect incorrect implementations of Ord that prevent them from being able to produce a meaningfully sorted result, and will now panic on such cases rather than returning effectively randomly arranged data. Users encountering these panics should audit their ordering implementations to ensure they satisfy the requirements documented in PartialOrd and Ord.

#[expect(lint)]

1.81 stabilizes a new lint level, expect, which allows explicitly noting that a particular lint should occur, and warning if it doesn't. The intended use case for this is temporarily silencing a lint, whether due to lint implementation bugs or ongoing refactoring, while wanting to know when the lint is no longer required.

\ For example, if you're moving a code base to comply with a new restriction enforced via a Clippy lint like undocumented_unsafe_blocks, you can use #[expect(clippy::undocumented_unsafe_blocks)] as you transition, ensuring that once all unsafe blocks are documented you can opt into denying the lint to enforce it.

\ Clippy also has two lints to enforce the usage of this feature and help with migrating existing attributes:

  • clippy::allow_attributes to restrict allow attributes in favor of #[expect] or to migrate #[allow] attributes to #[expect]
  • clippy::allow_attributes_without_reason To require a reason for #[allow] attributes

Lint reasons

Changing the lint level is often done for some particular reason. For example, if code runs in an environment without floating point support, you could use Clippy to lint on such usage with #![deny(clippy::float_arithmetic)]. However, if a new developer to the project sees this lint fire, they need to look for (hopefully) a comment on the deny explaining why it was added. With Rust 1.81, they can be informed directly in the compiler message:

error: floating-point arithmetic detected  --> src/lib.rs:4:5   | 4 |     a + b   |     ^^^^^   |   = help: for further information visit https://rust-lang.github.io/rust-clippy/master/index.html#float_arithmetic   = note: no hardware float support note: the lint level is defined here  --> src/lib.rs:1:9   | 1 | #![deny(clippy::float_arithmetic, reason = "no hardware float support")]   |         ^^^^^^^^^^^^^^^^^^^^^^^^ 

Stabilized APIs

  • core::error
  • hint::assert_unchecked
  • fs::exists
  • AtomicBool::fetch_not
  • Duration::abs_diff
  • IoSlice::advance
  • IoSlice::advance_slices
  • IoSliceMut::advance
  • IoSliceMut::advance_slices
  • PanicHookInfo
  • PanicInfo::message
  • PanicMessage

These APIs are now stable in const contexts:

  • char::from_u32_unchecked (function)
  • char::from_u32_unchecked (method)
  • CStr::count_bytes
  • CStr::from_ptr

Compatibility notes

Split panic hook and panic handler arguments

We have renamed std::panic::PanicInfo to std::panic::PanicHookInfo. The old name will continue to work as an alias, but will result in a deprecation warning starting in Rust 1.82.0.

\ core::panic::PanicInfo will remain unchanged, however, as this is now a different type.

\ The reason is that these types have different roles: std::panic::PanicHookInfo is the argument to the panic hook in std context (where panics can have an arbitrary payload), while core::panic::PanicInfo is the argument to the #[panic_handler] in #![no_std] context (where panics always carry a formatted message).

\ Separating these types allows us to add more useful methods to these types, such as std::panic::PanicHookInfo::payload_as_str() and core::panic::PanicInfo::message().

Abort on uncaught panics in extern "C" functions

This completes the transition started in 1.71, which added dedicated "C-unwind" (amongst other -unwind variants) ABIs for when unwinding across the ABI boundary is expected. As of 1.81, the non-unwind ABIs (e.g., "C") will now abort on uncaught unwinds, closing the longstanding soundness problem.

\ Programs relying on unwinding should transition to using -unwind suffixed ABI variants.

WASI 0.1 target naming changed

Usage of the wasm32-wasi target (which targets WASI 0.1) will now issue a compiler warning and request users switch to the wasm32-wasip1 target instead. Both targets are the same, wasm32-wasi is only being renamed, and this change to the WASI target is being done to enable removing wasm32-wasi in January 2025.

Fixes CVE-2024-43402

std::process::Command now correctly escapes arguments when invoking batch files on Windows in the presence of trailing whitespace or periods (which are ignored and stripped by Windows).

See more details in the previous announcement of this change.

Other changes

Check out everything that changed in Rust, Cargo, and Clippy.

Contributors to 1.81.0

Many people came together to create Rust 1.81.0. We couldn't have done it without all of you. Thanks!


The Rust Team

\ Also published here

\ Photo by Patrick Tomasso on Unsplash

Market Opportunity
Core DAO Logo
Core DAO Price(CORE)
$0.08235
$0.08235$0.08235
+2.17%
USD
Core DAO (CORE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

eurosecurity.net Expands Cryptocurrency Asset Recovery Capabilities Amid Rising Investor Losses

eurosecurity.net Expands Cryptocurrency Asset Recovery Capabilities Amid Rising Investor Losses

New York, NY/ GlobePRWire / Feb 6, 2026 – eurosecurity.net announces the expansion of its cryptocurrency asset recovery services, reflecting increased demand from
Share
CryptoReporter2026/02/06 17:24
Ethereum to boost scalability and roll out Fusaka upgrade on Dec 3

Ethereum to boost scalability and roll out Fusaka upgrade on Dec 3

Ethereum's Fusaka update may happen on December 3, based on the date set in the latest developer call.
Share
Cryptopolitan2025/09/19 17:00
Google Cloud taps EigenLayer to bring trust to agentic payments

Google Cloud taps EigenLayer to bring trust to agentic payments

The post Google Cloud taps EigenLayer to bring trust to agentic payments appeared on BitcoinEthereumNews.com. Two days after unveiling AP2 — a universal payment layer for AI agents that supports everything from credit cards to stablecoins — Google and EigenLayer have released details of their partnership to bring verifiability and restaking security to the stack, using Ethereum. In addition to enabling verifiable compute and slashing-backed payment coordination, EigenCloud will support insured and sovereign AI agents, which introduce consequences for failure or deviation from specified behavior. Sovereign agents are positioned as autonomous actors that can own property, make decisions, and execute actions independently — think smart contracts with embedded intelligence. From demos to dollars AP2 extends Google’s agent-to-agent (A2A) protocol using the HTTP 402 status code — long reserved for “payment required” — to standardize payment requests between agents across different networks. It already supports stablecoins like USDC, and Coinbase has demoed an agent checkout using its Wallet-as-a-Service. Paired with a system like Lit Protocol’s Vincent — which enforces per-action policies and key custody at signing — Google’s AP2 with EigenCloud’s verifiability and cross-chain settlement could form an end-to-end trust loop. Payments between agents aren’t as simple as they are often made to sound by “Crypto x AI” LARPs. When an AI agent requests a payment in USDC on Base and the payer’s funds are locked in ETH on Arbitrum, the transaction stalls — unless something abstracts the bridging, swapping and delivery. That’s where EigenCloud comes in. Sreeram Kannan, founder of EigenLayer, said the integration will create agents that not only run on-chain verifiable compute, but are also economically incentivized to behave within programmable bounds. Through restaked operators, EigenCloud powers a verifiable payment service that handles asset routing and chain abstraction, with dishonest behavior subject to slashing. It also introduces cryptographic accountability to the agents themselves, enabling proofs that an agent actually executed the task it…
Share
BitcoinEthereumNews2025/09/19 03:52