duped 4 hours ago

The graceful shutdown stuff is good, but always piping the output of child processes is not necessarily the right thing to do. Some processes need stdin (what if it's a shell?) and some processes will be checking if stdout is a tty. What you should do (and Rust doesn't make this easy) is allocate a new pty for your child processes if your own stdout is a tty. Some programs default to this (eg: ssh), others make it configurable (eg: docker).

You're also missing the standard techniques for managing and reaping your children, which I don't see mentioned. You don't need to maintain a registry of child processes for example, at least on Linux there are a few things you can do for this without any global state (PR_SET_PDEATHSIG, PR_SET_CHILD_SUBREAPER, PID namespaces). On MacOS you can write a routine to reap children like a linux init() process would. The registry approach is also fragile: what if library code spawns children?

Also, if the terminal is in raw mode then you'll never get ctrl+C. This is really about signal handling. You also can't gracefully shutdown if you get a SIGKILL, which is why PR_SET_PDEATHSIG and PID namespaces are very nice - they guarantee descendants get killed.

  • wpollock 4 hours ago

    >Also, if the terminal is in raw mode then you'll never get ctrl+C.

    The process/thread/task won't receive SIGINT, true. But I believe it will see the character ETX (ASCII 3). Programs that use raw mode input need to do their own keystroke processing.

    • duped 2 hours ago

      If you're in raw mode, whether ^C is SIGINT is open for interpretation

  • mmastrac 4 hours ago

    Don't use PR_SET_PDEATHSIG. That way lies pain.

anp 7 hours ago

I’ve definitely seen all of these problems in Rust programs but they certainly aren’t limited to Rust programs. I do think it would be nice if Rust libraries were a bit more misuse-resistant when it came to preserving a coherent terminal.

I also long for a more misuse-resistant terminal but that seems like a bigger problem.

mook 2 hours ago

I believe the real fun is when doing this on Windows, because it doesn't use Unix signals (and generally speaking you only get the equivalent of SIGKILL but not SIGTERM, but you can opt into ~SIGINT). I was hoping this would actually deal with that…

silon42 2 hours ago

It seems wrong that the app would be responsible for cleanup... Shouldn't this be solved in the shell / terminal ? What if kill -9?

  • pjerem an hour ago

    When you use ctrl+c, you are not killing the program, you are sending it a SIGTERM signal which essentially means « could you please stop yourself ? » so the program have a chance to clean things before exiting.

    kill -9 is sending a SIGKILL signal which, well, kills the program immediately.

vlovich123 6 hours ago

Nothing here is specific to Rust and applies to any terminal app in any language that spawns a child process.

  • stonogo 6 hours ago

    Nothing, that is, except for the examples, the source code, the libraries, and the linked references. But nothing else.

    • dwattttt 5 hours ago

      Are you suggesting that the examples, source, libraries, and references for Rust make these mistakes, but other languages don't?

      • oatsandsugar 3 hours ago

        the title: "fixing ... in rust". The problems aren't necessarily rust only problems, the solutions are rust solutions.

koakuma-chan 7 hours ago

Are you saying that after the main process has exited, child processes can still run and write to stdout/stderr?

  • CGamesPlay 4 hours ago

    Child processes are created using, generally, 2 syscalls: fork, then exec. When you fork, all file descriptors the main process has open are copied, and are now open in two places. Then, when the child calls exec (to transform itself into the target program), all file descriptors stay open in the new process (unless a specific fd is explicitly configured otherwise, FD_CLOEXEC).

    Standard output are just file descriptors with the number 0, 1, and 2, and you can use the dup2 syscall to assign those numbers to some pipes that you originally created before you fork. Now the standard output of your child process is going to those pipes in your parent process. Or you can close those file descriptors, which will prevent the child process from reading/writing them at all. Or you can do nothing, and the copied file descriptors from the parent still apply.

    Conceptually, you think of "spawning a child" as something that is in some kind of container (the parent process), but the underlying mechanics are not like this at all, and processes don't actually exist in a "tree", they just happen to keep a record of their "parent process ID" so the OS knows who to notify when the process dies.

    • zokier 5 minutes ago

      > Conceptually, you think of "spawning a child" as something that is in some kind of container (the parent process), but the underlying mechanics are not like this at all,

      That is not quite right either, the newly created child processes generally go to the same process group as the parent, the process groups (and sessions) forming those "containers".

      Tbh this is one of the many murky areas of UNIX.

    • burnt-resistor 3 hours ago

      fork() when followed by exec*() is generally inefficient. That's why vfork(), clone(), and clone3() exist. There's no point in duplicating (even CoW) the entire kernel side and libc internal state of a process if it's going to be replaced with exec*() by a new, unrelated process.

  • duped 4 hours ago

    Yes, this is easy to test too:

        #include <stdio.h>
        #include <unistd.h>
        #include <sys/types.h>
        int main() {
            pid_t pid = fork();
            if (pid == 0) {
                sleep(1);
                printf("after parent died!\n");
                return 0;
            }
            return 0;
        }
    
    You'll see the message printed out 1 second after the process ends.
  • Callicles 7 hours ago

    I believe I am saying child processes can write to stdout as the main process is shutting down. Also, if the child processes are not shut down properly and are left dangling, and the child processes were set up as 'inherit' to be able to write directly to stdout/stderr then yes.

rendaw 4 hours ago

I hate to be the guy, but I could barely see the code snippets. Is contrast an issue for anyone else? Reader mode improves thins slightly but at the cost of code being unhighlighted and wrapping like crazy.

  • chrismorgan 2 hours ago

    The highlighting is clearly designed for a dark background but has been given a light background in light mode. Change the bg-neutral-100 to bg-neutral-900 and it’s fine—still not magnificent, but fine.

    (But as for barely… if you don’t run JS, then you just don’t see the code snippets, because for some inscrutable reason, unlike the rest of the document, they’re only rendered client-side.)

  • dxdm 3 hours ago

    Yes, the contrast of the code examples is not great. Grey on grey, light pastels and orange does not combine into an easy-to-read color palette for me.

windowshopping 7 hours ago

This title was close to being a garden path sentence, but ultimately avoided it.

  • impish9208 5 hours ago

    Yes, daemonized children must always be killed; preferably by the parent, but any reaper would also work.

    • oatsandsugar 5 hours ago

      Is that a forking path sentence? If so, whoosh.

npalli 6 hours ago

Fearless concurrency with Rust unless you are worried about lifecycle management, threads/co-operation and general ergonomics. Even modern c++ might be better at this (gasp!) with std::jthread

  • duped 5 hours ago

    Are there any languages that provide for or care about lifecycle management across address space boundaries? After fork() you're usually fucked and need explicit controls.

    • zokier 2 minutes ago

      [delayed]

  • dwattttt 5 hours ago

    I believe Rust's std::thread::scope is an equivalent.

    > Unlike non-scoped threads, scoped threads can borrow non-'static data, as the scope guarantees all threads will be joined at the end of the scope.

    > All threads spawned within the scope that haven’t been manually joined will be automatically joined before this function returns.

  • jeffbee 5 hours ago

    Yes, and if you update to a version of LLVM that was released literally a week ago, jthread exists.