suture VS Rust-for-Linux

Compare suture vs Rust-for-Linux and see what are their differences.

Rust-for-Linux

Adding support for the Rust language to the Linux kernel. (by Rust-for-Linux)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
suture Rust-for-Linux
14 79
1,268 3,797
- 0.6%
5.7 0.0
about 2 months ago about 5 hours ago
Go C
MIT License GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

suture

Posts with mentions or reviews of suture. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-01.
  • Could I get a code review?
    11 projects | /r/golang | 1 Jun 2023
    This one is highly specialized, but I'm a huge fan of Suture for managing long lived goroutines.
  • [gopulse/pulse] the Golang framework designed to ensure your web services stay alive.
    3 projects | /r/golang | 17 Apr 2023
    In English, your phrasing doesn't come off as a play on words/a reference to the name, so much as it describes a feature of the library. The expectation is, with the description you've given it, the library would handle some form of resilience in service management. I half expected the library to be similar to Suture.
  • Ergo: Erlang/OTP Implemented in Golang
    3 projects | news.ycombinator.com | 28 Jan 2023
    It does not give you a way to reliably track arbitrary goroutines that "this" goroutine (for whatever that may be) wants to track, the way an Erlang process can just "link" to anything it is capable of naming the PID for.

    However, you can construct a reliable mechanism where one goroutine can start another and know whether or not the one it started has failed by using the available primitives, as I did in https://github.com/thejerf/suture . It's an easier problem since there's no cluster and no network that can get in the way. I've also done the exercise for the network case: https://pkg.go.dev/github.com/thejerf/reign#Address.OnCloseN... but that only functions within the network defined by that library because, again, it just isn't arbitrarily possible.

    (I suppose it's relevant to some of my other comments to point out that I've also implemented basically Erlang-style concurrency in Go, with network, but as a relatively idiomatic translation rather than a blind one.)

  • Is there an equivalent to Elixir / GenServer in Go? Trying to create the same request / response pattern with better performance but not sure where to start.
    2 projects | /r/golang | 23 Jan 2023
    If you also want Supervisor-like behavior, take a look at suture.
  • Start an already running service: no error, error, or panic?
    1 project | /r/golang | 2 Jan 2023
    For context, I've been working with similar interfaces for many years through suture.
  • Erlang vs Golang
    2 projects | /r/golang | 13 Nov 2022
    I wrote suture for idiomatically-ported supervisor trees (that is, the ways they differ are deliberately chosen, not accidents), and reign for Go-native cluster-like support. I use suture in almost everything I write. Reign is used on production services but I don't generally use it because I think modern stacks have better options with modern message busses, but it can be useful for porting.
  • Erlang-ish supervisor trees for Go
    1 project | news.ycombinator.com | 13 Jul 2022
  • How “let it fail” leads to simpler code
    3 projects | news.ycombinator.com | 13 Jul 2022
    I think the distinction between expected and unexpected errors can easily fall through the cracks and writing code in a way that an unexpected error doesn’t break everything is quite powerful.

    Golang makes it easy to ignore errors that can be ignored and defer/recover provide a way to implement a way to “let it fail”

    There’s even an implementation of supervisor trees for Go [0] :)

    [0] https://github.com/thejerf/suture

  • Golang vs Elixir protoactor supervision
    2 projects | /r/golang | 26 Jun 2022
    (If you'd like something lighter weight, suture is a supervisor library without a whole lot of other stuff. If you want that other stuff, by all means, go to town.)
  • The method to manage multiple services in a process.
    2 projects | /r/golang | 17 Apr 2022
    This is the primary reason almost every program I write ends up using suture. The restarting is nice when it works, but Go code is often reasonably robust. (Not 100%, but reasonably.) But it's a nice organization principle.

Rust-for-Linux

Posts with mentions or reviews of Rust-for-Linux. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-02-18.
  • The Linux Kernel Prepares for Rust 1.77 Upgrade
    9 projects | news.ycombinator.com | 18 Feb 2024
    Rust is backwards compatible when you stick to stable features, but the kernel uses unstable features that can and do incur breaking changes.

    https://github.com/Rust-for-Linux/linux/issues/2

  • Rust in Linux Kernel
    1 project | /r/ThePrimeagenReact | 8 Oct 2023
  • Mark Russinovich: “Working towards enabling Windows driver development in Rust”
    7 projects | news.ycombinator.com | 23 Sep 2023
    > How would this work?

    Don't know exactly what you're asking.

    > And why would it be a better idea?

    Poorly written device drivers are a significant attack vector. It's one of the reasons Linux is now exploring using Rust for its own device drivers.[0] You may be asking -- why Rust and not some other language? Rust has many of the performance and interoperability advantages of C and C++, but as noted, makes certain classes of memory safety issues impossible. Rust also has significant mindshare among systems programming communities.

    [0]: https://rust-for-linux.com

  • The Linux Kernel Module Programming Guide
    2 projects | news.ycombinator.com | 1 May 2023
    Ctrl-F "rust"

    https://rust-for-linux.com/ links to LWN articles at https://lwn.net/Kernel/Index/#Development_tools-Rust that suggest that only basic modules are yet possible with the rust support in Linux kernels 6.2 and 6.3.

    Rust-for-linux links to the Android binder module though:

    > Android Binder Driver: This project is an effort to rewrite Android's Binder kernel driver in Rust.

    > Motivation: Binder is one of the most security and performance critical components of Android. Android isolates apps from each other and the system by assigning each app a unique user ID (UID). This is called "application sandboxing", and is a fundamental tenet of the Android Platform Security Model.

    > The majority of inter-process communication (IPC) on Android goes through Binder. Thus, memory unsafety vulnerabilities are especially critical when they happen in the Binder driver

    ... "Rust in the Linux kernel" (2021) https://security.googleblog.com/2021/04/rust-in-linux-kernel... :

    > [...] We also need designs that allow code in the two languages to interact with each other: we're particularly interested in safe, zero-cost abstractions that allow Rust code to use kernel functionality written in C, and how to implement functionality in idiomatic Rust that can be called seamlessly from the C portions of the kernel.

    > Since Rust is a new language for the kernel, we also have the opportunity to enforce best practices in terms of documentation and uniformity. For example, we have specific machine-checked requirements around the usage of unsafe code: for every unsafe function, the developer must document the requirements that need to be satisfied by callers to ensure that its usage is safe; additionally, for every call to unsafe functions (or usage of unsafe constructs like dereferencing a raw pointer), the developer must document the justification for why it is safe to do so.

    > We'll now show how such a driver would be implemented in Rust, contrasting it with a C implementation. [...]

    This guide with unsafe rust that calls into the C, and then with next gen much safer rust right next to it would be a helpful resource too.

    What of the post-docker container support (with userspaces also written in go) should be cloned to rust first?

  • Teknisk karrierevej i Danmark som softwareudvikler
    1 project | /r/dkfinance | 8 Apr 2023
  • The state of Flatpak security: major Projects are the worst?
    3 projects | /r/flatpak | 20 Feb 2023
    Rust-for-Linux issue tracker
  • rust devs in a nutshell
    2 projects | /r/ProgrammerHumor | 14 Feb 2023
  • Rustproofing Linux (Part 1/4 Leaking Addresses)
    2 projects | /r/rust | 10 Feb 2023
    Yes, I definitely agree that it's a problem that pr_info implicitly wraps its arguments in unsafe {}. I wrote my own Pull Request with a trival fix.
  • how to compile a rust "hello world" with kernel 6.1?
    2 projects | /r/rust | 23 Dec 2022
    Note that this template won't work with Linux 6.1, which has very minimal Rust support. You'll want the RustForLinux tree, or maybe Linux 6.2.
  • If your dream was to be part of a big project like the linux kernel, what would be the first step if you are already an average programmer?
    1 project | /r/rust | 19 Dec 2022
    You can join Rust for Linux zulip chat by requesting invite using the link in https://github.com/Rust-for-Linux/linux 's README.

What are some alternatives?

When comparing suture and Rust-for-Linux you can also consider the following projects:

rustig - A tool to detect code paths leading to Rust's panic handler

jakt - The Jakt Programming Language

protoactor-go - Proto Actor - Ultra fast distributed actors for Go, C# and Java/Kotlin

gccrs - GCC Front-End for Rust

bastion - Highly-available Distributed Fault-tolerant Runtime

rfcs - RFCs for changes to Rust

reign - Rewrite Erlang In Go Nicely - a library for mimicking Erlang's mailboxes and clustering

ergo - An actor-based Framework with network transparency for creating event-driven architecture in Golang. Inspired by Erlang. Zero dependencies.

dafny - Dafny is a verification-aware programming language

chi - lightweight, idiomatic and composable router for building Go HTTP services

PrawnOS - Libre Mainline Kernel and Debian for arm laptops