A core dump is a file containing a process's address space (memory) when the process terminates unexpectedly. Core dumps may be produced on-demand (such as by a debugger), or automatically upon termination. Core dumps are triggered by the kernel in response to program crashes, and may be passed to a helper program (such as systemd-coredump) for further processing. A core dump is not typically used by an average user, but may be passed on to developers upon request where it can be invaluable as a post-mortem snapshot of the program's state at the time of the crash, especially if the fault is hard to reliably reproduce.
Disabling automatic core dumps
Users may wish to disable automatic core dumps for a number of reasons:
- Performance: generating core dumps for memory-heavy processes can waste system resources and delay the cleanup of memory.
- Disk space: core dumps of memory-heavy processes may consume disk space equal to, if not greater, than the process's memory footprint if not compressed.
- Security: core dumps, although typically readable only by root, may contain sensitive data (such as passwords or cryptographic keys), which are written to disk following a crash.
To apply the setting immediately, use
# sysctl -p /etc/sysctl.d/50-coredump.conf
systemd's default behavior is to generate core dumps for all processes in
/var/lib/systemd/coredump. This behavior can be overridden by creating a configuration snippet in the
/etc/systemd/coredump.conf.d/ directory with the following content:
[Coredump]section name, otherwise this option will be ignored:
systemd-coredump: [/etc/systemd/coredump.conf.d/custom.conf:1] Assignment outside of section. Ignoring.
Then reload systemd's configuration.
# systemctl daemon-reload
This method alone is usually sufficient to disable userspace core dumps, so long as no other programs enable automatic core dumps on the system, but the coredump is still generated in memory and systemd-coredump run.
Using PAM limits
* hard core 0
Command-line shells such as bash or zsh provide a builtin ulimit command which can be used to report or set resource limits of the shell and the processes started by the shell. See or for details.
To disable core dumps in the current shell:
$ ulimit -c 0
Making a core dump
To generate a core dump of an arbitrary process, first install the package. Then find the PID of the running process, for example with pgrep:
$ pgrep -f firefox
Attach to the process:
$ gdb -p 2071
Then at the
(gdb) generate-core-file Saved corefile core.2071 (gdb) quit
Now you have a coredump file called
Where do they go?
kernel.core_pattern sysctl decides where automatic core dumps go. By default, core dumps are sent to systemd-coredump which can be configured in
/etc/systemd/coredump.conf. By default, all core dumps are stored in
/var/lib/systemd/coredump (due to
Storage=external) and they are compressed with
lz4 (due to
Compress=yes). Additionally, various size limits for the storage can be configured.
kernel.core_patternis set in
/usr/lib/sysctl.d/50-coredump.conf. This file may be masked or overridden to use a different setting following normal rules.
To retrieve a core dump from the journal, see.
Examining a core dump
Use coredumpctl to find the corresponding dump:
# coredumpctl list
You need to uniquely identify the relevant dump. This is possible by specifying a
PID, name of the executable, path to the executable or a journalctl predicate (see and for details). To see details of the core dumps:
# coredumpctl info match
Pay attention to "Signal" row, that helps to identify crash cause. For deeper analysis you can examine the backtrace using gdb:
# coredumpctl gdb match
When gdb is started, use the
bt command to print the backtrace:
See Debug - Getting Traces if debugging symbols are requested, but not found.
Cleanup of core dump files
The core dump files stored in
/var/lib/systemd/coredump/ will be automatically cleaned by
systemd-tmpfiles --clean, which is triggered daily with
systemd-tmpfiles-clean.timer. Core dumps are configured to persist for at least 3 days, see