Uploaded image for project: 'Mesos'
  1. Mesos
  2. MESOS-8229

Make it possible to reliably inject environment variables into forked processes

    XMLWordPrintableJSON

Details

    • Improvement
    • Status: Open
    • Major
    • Resolution: Unresolved
    • None
    • None
    • agent, containerization, master
    • None

    Description

      We should consider supporting reliable injection of environment variables into forked processes, e.g., to customize dynamic library loading with LD_PRELOAD or the influence the behavior of the used runtime (e.g., glibc options). Customary, environment variables are used for this, but we tend to in many cases strip away all but a hardcoded set of flags (e.g., when starting executors). The possible set of these flags seems to be open.

      I came across this when trying to run our test suites with a build with clang address sanitization enabled (passing -fsanitize=address in the compiler flags). This links in a C runtime which aborts processes if memory leaks are detected. These aborts can be disabled by passing runtime options in an environment variable ASAN_OPTIONS, but unfortunately, it is not effective in all forked processes.

      Attachments

        Issue Links

          Activity

            People

              Unassigned Unassigned
              bbannier Benjamin Bannier
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

                Created:
                Updated: