-
Notifications
You must be signed in to change notification settings - Fork 13.7k
[Support] Fix Process::PreventCoreFiles() when coredumps are piped #83703
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Support] Fix Process::PreventCoreFiles() when coredumps are piped #83703
Conversation
Created using spr 1.3.4
@llvm/pr-subscribers-llvm-support Author: Alexander Richardson (arichardson) ChangesOn Linux, if the kernel.core_pattern sysctl starts with a '|' (i.e. it Full diff: https://github.com/llvm/llvm-project/pull/83703.diff 1 Files Affected:
diff --git a/llvm/lib/Support/Unix/Process.inc b/llvm/lib/Support/Unix/Process.inc
index f94eec6963c18e..ac80c199d028c9 100644
--- a/llvm/lib/Support/Unix/Process.inc
+++ b/llvm/lib/Support/Unix/Process.inc
@@ -143,7 +143,18 @@ void Process::GetTimeUsage(TimePoint<> &elapsed,
void Process::PreventCoreFiles() {
#if HAVE_SETRLIMIT
struct rlimit rlim;
- rlim.rlim_cur = rlim.rlim_max = 0;
+ getrlimit(RLIMIT_CORE, &rlim);
+#ifdef __linux__
+ // On Linux, if the kernel.core_pattern sysctl starts with a '|' (i.e. it
+ // is being piped to a coredump handler such as systemd-coredumpd), the
+ // kernel ignores RLIMIT_CORE (since we aren't creating a file in the file
+ // system) except for the magic value of 1, that disables coredumps when
+ // piping. 1 byte is also too small for any kind of valid core dump, so it
+ // also disables coredumps if kernel.core_pattern creates files directly.
+ rlim.rlim_cur = std::min<rlim_t>(1, rlim.rlim_max);
+#else
+ rlim.rlim_cur = 0;
+#endif
setrlimit(RLIMIT_CORE, &rlim);
#endif
|
Does 1 leave a kernel warning when kernel.core_pattern specifies a pipe? Then how about |
I considered that, but according to the manpage it means we can't ptrace the process afterwards:
It does look like it will add to dmesg (but it already seems flooded with lots of other messages):
Is this a dealbreak? I can see if another value avoids the coredump without spamming dmesg. |
It isn't a dealbreaker. Since |
Sounds good! I just tried reading through the systemd coredump code and it seems like they don't write the coredump if the rlimit is set to a value smaller than one PAGE: https://github.com/systemd/systemd/blob/1500b656cd6e4500dd0514d90c27fe0e16b14c77/src/coredump/coredump.c#L438 However, it seems like the kernel is still streaming many gigabytes of data to the file descriptor. I'm not sure if that is an issue on the systemd side or the kernel side. |
Further debugging shows that the systemd-coredumpd config file has a hardcoded RLIMIT_INFINITY value:
After changing the value to use %c as it should be in the default config file (https://github.com/systemd/systemd/blob/main/sysctl.d/50-coredump.conf.in)
I will file a bug with the people configuring the system, so that it gets fixed for all my coworkers but even though this is a misconfigured system, I think setting the value to 1 is still beneficial since these are expected coredumps that don't need to show up coredumpctl. |
It turns out all of this is caused by the following Debian patch https://salsa.debian.org/systemd-team/systemd/-/commit/64599ffe44f0d. Created as part of https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815020 |
On Linux, if the kernel.core_pattern sysctl starts with a '|' (i.e. it is being piped to a coredump handler such as systemd-coredumpd), the kernel ignores RLIMIT_CORE (since we aren't creating a file in the file system) except for the magic value of 1, that disables coredumps when piping. 1 byte is also too small for any kind of valid core dump, so it also disables coredumps if kernel.core_pattern creates files directly. See llvm#83701 and llvm#45797 Pull Request: llvm#83703
Created using spr 1.3.6-beta.1
On many current Linux systems, coredumps are no longer dumped in the CWD
but instead piped to a utility such as systemd-coredumpd that stores
them in a deterministic location. This can be done by setting the
kernel.core_pattern sysctl to start with a '|'. However, when using such
a setup the kernel ignores a coredump limit of 0 (since there is no file
being written) and we can end up piping many gigabytes of data to
systemd-coredumpd which causes the test suite to freeze for a long time.
While most piped coredump handlers do respect the crashing processes'
RLIMIT_CORE, this is notable not the case for Debian's systemd-coredump
due to a local patch that changes sysctl.d/50-coredump.conf to ignore
the specified limit and instead use RLIM_INFINITY
(https://salsa.debian.org/systemd-team/systemd/-/commit/64599ffe44f0d).
Fortunately there is a workaround: the kernel recognizes the magic value
of 1 for RLIMIT_CORE to disable coredumps when piping. One byte is also
too small to generate any coredump, so it effectively behaves as if we
had set the value to zero.
The alternative to using RLIMIT_CORE=1 would be to use prctl() with the
PR_SET_DUMPABLE flag, however that also prevents ptrace(), so makes it
impossible to attach a debugger.
See #83701 and
#45797