ubuntu 启用core文件

  1. ~/.bashrc文件末尾增加ulimit -c unlimited然后保存

  2. 在当前session下执行source ~/.bashrc命令即时生效

  3. 配置core文件格式:
    sudo sysctl -w kernel.core_pattern=core.%p.%s.%c.%d.%P.%E

  4. core文件详解

core(5)                                                                                                            File Formats Manual                                                                                                           core(5)NAMEcore - core dump fileDESCRIPTIONThe default action of certain signals is to cause a process to terminate and produce a core dump file, a file containing an image of the process’s memory at the time of termination.  This image can be used in a debugger (e.g., gdb(1)) to in‐spect the state of the program at the time that it terminated.  A list of the signals which cause a process to dump core can be found in signal(7).A process can set its soft RLIMIT_CORE resource limit to place an upper limit on the size of the core dump file that will be produced if it receives a "core dump" signal; see getrlimit(2) for details.There are various circumstances in which a core dump file is not produced:•  The  process does not have permission to write the core file.  (By default, the core file is called core or core.pid, where pid is the ID of the process that dumped core, and is created in the current working directory.  See below for de‐tails on naming.)  Writing the core file fails if the directory in which it is to be created is not writable, or if a file with the same name exists and is not writable or is not a regular file (e.g., it  is  a  directory  or  a  symboliclink).•  A (writable, regular) file with the same name as would be used for the core dump already exists, but there is more than one hard link to that file.•  The filesystem where the core dump file would be created is full; or has run out of inodes; or is mounted read‐only; or the user has reached their quota for the filesystem.•  The directory in which the core dump file is to be created does not exist.•  The RLIMIT_CORE (core file size) or RLIMIT_FSIZE (file size) resource limits for the process are set to zero; see getrlimit(2) and the documentation of the shell’s ulimit command (limit in csh(1)).  However, RLIMIT_CORE will be ignored ifthe system is configured to pipe core dumps to a program.•  The  binary  being executed by the process does not have read permission enabled.  (This is a security measure to ensure that an executable whose contents are not readable does not produce a—possibly readable—core dump containing an imageof the executable.)•  The process is executing a set‐user‐ID (set‐group‐ID) program that is owned by a user (group) other than the real user (group) ID of the process, or the process is executing a program that  has  file  capabilities  (see  capabilities(7)).(However, see the description of the prctl(2) PR_SET_DUMPABLE operation, and the description of the /proc/sys/fs/suid_dumpable file in proc(5).)•  /proc/sys/kernel/core_pattern is empty and /proc/sys/kernel/core_uses_pid contains the value 0.  (These files are described below.)  Note that if /proc/sys/kernel/core_pattern is empty and /proc/sys/kernel/core_uses_pid contains the value1, core dump files will have names of the form .pid, and such files are hidden unless one uses the ls(1) -a option.•  (Since Linux 3.7) The kernel was configured without the CONFIG_COREDUMP option.In addition, a core dump may exclude part of the address space of the process if the madvise(2) MADV_DONTDUMP flag was employed.On systems that employ systemd(1) as the init framework, core dumps may instead be placed in a location determined by systemd(1).  See below for further details.Naming of core dump filesBy  default,  a core dump file is named core, but the /proc/sys/kernel/core_pattern file (since Linux 2.6 and 2.4.21) can be set to define a template that is used to name core dump files.  The template can contain % specifiers which are sub‐stituted by the following values when a core file is created:%%  A single % character.%c  Core file size soft resource limit of crashing process (since Linux 2.6.24).%d  Dump mode—same as value returned by prctl(2) PR_GET_DUMPABLE (since Linux 3.7).%e  The process or thread’s comm value, which typically is the same as the executable filename (without path prefix, and truncated to a maximum of 15 characters), but may have been modified to be something different; see  the  discussionof /proc/pid/comm and /proc/pid/task/tid/comm in proc(5).%E  Pathname of executable, with slashes ('/') replaced by exclamation marks ('!') (since Linux 3.0).%g  Numeric real GID of dumped process.%h  Hostname (same as nodename returned by uname(2)).%i  TID of thread that triggered core dump, as seen in the PID namespace in which the thread resides (since Linux 3.18).%I  TID of thread that triggered core dump, as seen in the initial PID namespace (since Linux 3.18).%p  PID of dumped process, as seen in the PID namespace in which the process resides.%P  PID of dumped process, as seen in the initial PID namespace (since Linux 3.12).%s  Number of signal causing dump.%t  Time of dump, expressed as seconds since the Epoch, 1970‐01‐01 00:00:00 +0000 (UTC).%u  Numeric real UID of dumped process.A  single % at the end of the template is dropped from the core filename, as is the combination of a % followed by any character other than those listed above.  All other characters in the template become a literal part of the core filename.The template may include '/' characters, which are interpreted as delimiters for directory names.  The maximum size of the resulting core filename is 128 bytes (64 bytes before Linux 2.6.19).  The default value in this file is  "core".   Forbackward compatibility, if /proc/sys/kernel/core_pattern does not include %p and /proc/sys/kernel/core_uses_pid (see below) is nonzero, then .PID will be appended to the core filename.Paths  are interpreted according to the settings that are active for the crashing process.  That means the crashing process’s mount namespace (see mount_namespaces(7)), its current working directory (found via getcwd(2)), and its root direc‐tory (see chroot(2)).Since Linux 2.4, Linux has also provided a more primitive method of controlling the name of the core dump file.  If the /proc/sys/kernel/core_uses_pid file contains the value 0, then a core dump file is simply named core.  If this file  con‐tains a nonzero value, then the core dump file includes the process ID in a name of the form core.PID.Since Linux 3.6, if /proc/sys/fs/suid_dumpable is set to 2 ("suidsafe"), the pattern must be either an absolute pathname (starting with a leading '/' character) or a pipe, as defined below.Piping core dumps to a programSince  Linux 2.6.19, Linux supports an alternate syntax for the /proc/sys/kernel/core_pattern file.  If the first character of this file is a pipe symbol (|), then the remainder of the line is interpreted as the command‐line for a user‐spaceprogram (or script) that is to be executed.Since Linux 5.3.0, the pipe template is split on spaces into an argument list before the template parameters are expanded.  In earlier kernels, the template parameters are expanded first and the resulting string is split on  spaces  into  anargument  list.  This means that in earlier kernels executable names added by the %e and %E template parameters could get split into multiple arguments.  So the core dump handler needs to put the executable names as the last argument and en‐sure it joins all parts of the executable name using spaces.  Executable names with multiple spaces in them are not correctly represented in earlier kernels, meaning that the core dump handler needs to use mechanisms to find  the  executablename.Instead of being written to a file, the core dump is given as standard input to the program.  Note the following points:•  The program must be specified using an absolute pathname (or a pathname relative to the root directory, /), and must immediately follow the ’|’ character.•  The command‐line arguments can include any of the % specifiers listed above.  For example, to pass the PID of the process that is being dumped, specify %p in an argument.•  The process created to run the program runs as user and group root.•  Running as root does not confer any exceptional security bypasses.  Namely, LSMs (e.g., SELinux) are still active and may prevent the handler from accessing details about the crashed process via /proc/pid.•  The  program  pathname  is  interpreted  with  respect  to  the initial mount namespace as it is always executed there.  It is not affected by the settings (e.g., root directory, mount namespace, current working directory) of the crashingprocess.•  The process runs in the initial namespaces (PID, mount, user, and so on) and not in the namespaces of the crashing process.  One can utilize specifiers such as %P to  find  the  right  /proc/pid  directory  and  probe/enter  the  crashingprocess’s namespaces if needed.•  The  process starts with its current working directory as the root directory.  If desired, it is possible change to the working directory of the dumping process by employing the value provided by the %P specifier to change to the locationof the dumping process via /proc/pid/cwd.•  Command‐line arguments can be supplied to the program (since Linux 2.6.24), delimited by white space (up to a total line length of 128 bytes).•  The RLIMIT_CORE limit is not enforced for core dumps that are piped to a program via this mechanism./proc/sys/kernel/core_pipe_limitWhen collecting core dumps via a pipe to a user‐space program, it can be useful for the collecting program to gather data about the crashing process from that process’s /proc/pid directory.  In order to do this safely, the kernel  must  waitfor  the program collecting the core dump to exit, so as not to remove the crashing process’s /proc/pid files prematurely.  This in turn creates the possibility that a misbehaving collecting program can block the reaping of a crashed processby simply never exiting.Since Linux 2.6.32, the /proc/sys/kernel/core_pipe_limit can be used to defend against this possibility.  The value in this file defines how many concurrent crashing processes may be piped to user‐space programs in parallel.  If  this  valueis exceeded, then those crashing processes above this value are noted in the kernel log and their core dumps are skipped.A value of 0 in this file is special.  It indicates that unlimited processes may be captured in parallel, but that no waiting will take place (i.e., the collecting program is not guaranteed access to /proc/<crashing-PID>).  The default valuefor this file is 0.Controlling which mappings are written to the core dumpSince  Linux  2.6.23,  the Linux‐specific /proc/pid/coredump_filter file can be used to control which memory segments are written to the core dump file in the event that a core dump is performed for the process with the corresponding processID.The value in the file is a bit mask of memory mapping types (see mmap(2)).  If a bit is set in the mask, then memory mappings of the corresponding type are dumped; otherwise they are not dumped.  The bits in  this  file  have  the  followingmeanings:bit 0  Dump anonymous private mappings.bit 1  Dump anonymous shared mappings.bit 2  Dump file‐backed private mappings.bit 3  Dump file‐backed shared mappings.bit 4 (since Linux 2.6.24)Dump ELF headers.bit 5 (since Linux 2.6.28)Dump private huge pages.bit 6 (since Linux 2.6.28)Dump shared huge pages.bit 7 (since Linux 4.4)Dump private DAX pages.bit 8 (since Linux 4.4)Dump shared DAX pages.By default, the following bits are set: 0, 1, 4 (if the CONFIG_CORE_DUMP_DEFAULT_ELF_HEADERS kernel configuration option is enabled), and 5.  This default can be modified at boot time using the coredump_filter boot option.The value of this file is displayed in hexadecimal.  (The default value is thus displayed as 33.)Memory‐mapped I/O pages such as frame buffer are never dumped, and virtual DSO (vdso(7)) pages are always dumped, regardless of the coredump_filter value.A child process created via fork(2) inherits its parent’s coredump_filter value; the coredump_filter value is preserved across an execve(2).It can be useful to set coredump_filter in the parent shell before running a program, for example:$ echo 0x7 > /proc/self/coredump_filter$ ./some_programThis file is provided only if the kernel was built with the CONFIG_ELF_CORE configuration option.Core dumps and systemdOn  systems  using  the  systemd(1) init framework, core dumps may be placed in a location determined by systemd(1).  To do this, systemd(1) employs the core_pattern feature that allows piping core dumps to a program.  One can verify this bychecking whether core dumps are being piped to the systemd-coredump(8) program:$ cat /proc/sys/kernel/core_pattern|/usr/lib/systemd/systemd-coredump %P %u %g %s %t %c %eIn this case, core dumps will be placed in the location configured for systemd-coredump(8), typically as lz4(1) compressed files in the directory /var/lib/systemd/coredump/.  One can list the core  dumps  that  have  been  recorded  by  sys‐temd-coredump(8) using coredumpctl(1):$ coredumpctl list | tail -5Wed 2017-10-11 22:25:30 CEST  2748 1000 1000 3 present  /usr/bin/sleepThu 2017-10-12 06:29:10 CEST  2716 1000 1000 3 present  /usr/bin/sleepThu 2017-10-12 06:30:50 CEST  2767 1000 1000 3 present  /usr/bin/sleepThu 2017-10-12 06:37:40 CEST  2918 1000 1000 3 present  /usr/bin/catThu 2017-10-12 08:13:07 CEST  2955 1000 1000 3 present  /usr/bin/catThe  information shown for each core dump includes the date and time of the dump, the PID, UID, and GID  of the dumping process, the signal number that caused the core dump, and the pathname of the executable that was being run by the dumpedprocess.  Various options to coredumpctl(1) allow a specified coredump file to be pulled from the systemd(1) location into a specified file.  For example, to extract the core dump for PID 2955 shown above to a file named core in the  currentdirectory, one could use:$ coredumpctl dump 2955 -o coreFor more extensive details, see the coredumpctl(1) manual page.To (persistently) disable the systemd(1) mechanism that archives core dumps, restoring to something more like traditional Linux behavior, one can set an override for the systemd(1) mechanism, using something like:# echo "kernel.core_pattern=core.%p" > \/etc/sysctl.d/50-coredump.conf# /lib/systemd/systemd-sysctlIt  is  also  possible  to temporarily (i.e., until the next reboot) change the core_pattern setting using a command such as the following (which causes the names of core dump files to include the executable name as well as the number of thesignal which triggered the core dump):# sysctl -w kernel.core_pattern="%e-%s.core"NOTESThe gdb(1) gcore command can be used to obtain a core dump of a running process.In Linux versions up to and including 2.6.27, if a multithreaded process (or, more precisely, a process that shares its memory with another process by being created with the CLONE_VM flag of clone(2)) dumps core, then the process ID  is  al‐ways appended to the core filename, unless the process ID was already included elsewhere in the filename via a %p specification in /proc/sys/kernel/core_pattern.  (This is primarily useful when employing the obsolete LinuxThreads implementa‐tion, where each thread of a process has a different PID.)EXAMPLESThe  program  below  can  be  used  to  demonstrate  the  use  of  the pipe syntax in the /proc/sys/kernel/core_pattern file.  The following shell session demonstrates the use of this program (compiled to create an executable named core_pat‐tern_pipe_test):$ cc -o core_pattern_pipe_test core_pattern_pipe_test.c$ suPassword:# echo "|$PWD/core_pattern_pipe_test %p UID=%u GID=%g sig=%s" > \/proc/sys/kernel/core_pattern# exit$ sleep 100^\                     # type control-backslashQuit (core dumped)$ cat core.infoargc=5argc[0]=</home/mtk/core_pattern_pipe_test>argc[1]=<20575>argc[2]=<UID=1000>argc[3]=<GID=100>argc[4]=<sig=3>Total bytes in core dump: 282624Program source/* core_pattern_pipe_test.c */#define _GNU_SOURCE#include <sys/stat.h>#include <fcntl.h>#include <limits.h>#include <stdio.h>#include <stdlib.h>#include <unistd.h>#define BUF_SIZE 1024intmain(int argc, char *argv[]){ssize_t nread, tot;char buf[BUF_SIZE];FILE *fp;char cwd[PATH_MAX];/* Change our current working directory to that of thecrashing process. */snprintf(cwd, PATH_MAX, "/proc/%s/cwd", argv[1]);chdir(cwd);/* Write output to file "core.info" in that directory. */fp = fopen("core.info", "w+");if (fp == NULL)exit(EXIT_FAILURE);/* Display command-line arguments given to core_patternpipe program. */fprintf(fp, "argc=%d\n", argc);for (size_t j = 0; j < argc; j++)fprintf(fp, "argc[%zu]=<%s>\n", j, argv[j]);/* Count bytes in standard input (the core dump). */tot = 0;while ((nread = read(STDIN_FILENO, buf, BUF_SIZE)) > 0)tot += nread;fprintf(fp, "Total bytes in core dump: %zd\n", tot);fclose(fp);exit(EXIT_SUCCESS);}SEE ALSObash(1), coredumpctl(1), gdb(1), getrlimit(2), mmap(2), prctl(2), sigaction(2), elf(5), proc(5), pthreads(7), signal(7), systemd-coredump(8)Linux man‐pages 6.03                                                                                                   2023‐02‐05                                                                                                                core(5)

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/615276.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

Python入门-面向对象

1.类和对象 是不是很熟悉&#xff1f;和Java一样&#xff0c;在Python中&#xff0c;都可以把万物看成(封装成)对象。它俩都是面向对象编程 1.1 查看对象数据类型 a 10 b 9.8 c helloprint(type(a)) print(type(b)) print(type(c))运行结果&#xff1a; D:\Python_Home\v…

k8s-调度 13

调度器通过 kubernetes 的 watch 机制来发现集群中新创建且尚未被调度到 Node 上的 Pod。调度器会将发现的每一个未调度的 Pod 调度到一个合适的 Node 上来运行。 kube-scheduler 是 Kubernetes 集群的默认调度器&#xff0c;并且是集群控制面的一部分。 如果你真的希望或者有…

C#上位机与欧姆龙PLC的通信11----【爆肝】上位机应用开发(Winform版)

1、先上图 前面10讲&#xff0c;让你爽煹了肝&#xff0c;已经进入最后收尾阶段&#xff0c;这节来个常规应用&#xff0c;让前面的技能直接飞上天&#xff0c;我们要做的界面软件是这样的&#xff0c;虽然没有潘金莲漂亮&#xff0c;但也是爆抱&#xff1a; 2、如何爆&#x…

爬虫到底违法吗?你离违法还有多远?

最近&#xff0c;国家依法查处了部分编写爬虫程序&#xff0c;盗取其他公司数据的不良企业。一时间风声鹤唳&#xff0c;关于爬虫程序是否违法的讨论遍布程序员圈子。那么到底编写爬虫程序是否违法呢&#xff1f; 其爬虫下载数据&#xff0c;一般而言都不违法&#xff0c;因为…

【图的深度优先遍历】

前言 深度优先遍历简称DFS&#xff0c;主要思路是从图中一个未访问的顶点 V 开始&#xff0c;沿着一条路一直走到底&#xff0c;然后从这条路尽头的节点回退到上一个节点&#xff0c;再从另一条路开始走到底&#xff0c;不断递归重复此过程&#xff0c;直到所有的顶点都遍历完…

【机器学习】模型调参工具:Hyperopt 使用指南

机器学习| 模型调参工具&#xff1a;Hyperopt 使用指南 前言1. Hyperopt是什么&#xff1f;2. Hyperopt的优缺点3. 如何使用 Hyperopt 进行调参3.1 安装 Hyperopt3.2 构建超参数空间3.3 定义目标函数3.4 运行 Hyperopt 优化3.5 获取最优超参数 4. XGB调参代码示例参考资料 前言…

《设计模式的艺术》笔记 - 面向对象设计原则

1、单一职责原则 一个类只负责单一功能领域中的相应职责。 2、开闭原则 一个软件实体应当对扩展开放&#xff0c;对修改关闭。即软件实体应当尽量在不修改原有代码的情况下进行扩展。 3、里氏代换原则 所有引用基类的地方必须能透明地使用其子类的对象。即在软件中将一个基类…

Hyperledger Fabric Docker 方式多机部署生产网络

规划网络拓扑 3 个 orderer 节点&#xff1b;组织 org1 , org1 下有两个 peer 节点&#xff0c; peer0 和 peer1; 组织 org2 , org2 下有两个 peer 节点&#xff0c; peer0 和 peer1; 因为我只有 3 台虚拟机资源所以没法实现完全的多机部署&#xff0c;资源使用规划如下&#…

关于ubuntu20.04(Linux)屏幕突然横屏的解决方案

今天在用笔记本接深度相机&#xff08;Intel RealSense Depth Cameras&#xff09;的一瞬间&#xff0c;我的ubuntu界面突然横屏了&#xff0c;当时很惊讶&#xff01;一时间不知所措&#xff0c;后面找到了解决方案&#xff1a; 参考链接&#xff1a; Ubuntu桌面旋转xrandr_…

智能分析网关V4方案:太阳能+4G+AI识别搭建智慧果园/种植园远程视频监控监管方案

一、方案背景 我国是水果生产大国&#xff0c;果园种植面积大、产量高。由于果园的位置大都相对偏远、面积较大、看守人员较少&#xff0c;值守的工作人员无法顾及园区每个角落&#xff0c;果园财产安全成为了关注的重点。人为偷盗、野生生物偷吃等事件时有发生&#xff0c;并…

磷酸铁锂电池生产污废水需要哪些工艺及设备

磷酸铁锂电池作为一种常见的锂离子电池&#xff0c;已广泛应用于电动汽车、储能系统等领域。然而&#xff0c;在磷酸铁锂电池的生产过程中&#xff0c;难免会产生一定量的污废水。为了有效处理和处理这些污废水&#xff0c;我们需要合适的工艺和设备。 首先&#xff0c;针对磷酸…

制造业卓越管理从6S管理开始

在当今制造业环境中&#xff0c;企业间的竞争愈发激烈&#xff0c;而管理水平的卓越与否&#xff0c;直接决定了企业在市场竞争中的地位和成功与否。管理并非一蹴而就&#xff0c;需要经过不断的实践和探索&#xff0c;逐步提升。其中&#xff0c;6S管理作为现代企业管理的基础…

Ubuntu 卸载重装 Nvidia 显卡驱动

问题描述 我使用 airsim 的时候&#xff0c;发现 UE4 没法使用显卡&#xff0c;导致非常卡顿 输入 nvidia-smi 有显卡型号等信息的输出&#xff0c;但是进程 process 里面没有显示 airsim 和其他软件占用显卡情况 因此&#xff0c;我选择了卸载重装 一.卸载旧版本的驱动 …

JAVA面试部分——后端-线程前篇

3.1 线程和进程 在计算机科学中&#xff0c;进程和线程是操作系统管理资源的两种不同方式。 进程&#xff08;Process&#xff09;&#xff1a;是程序在计算机上的一次执行活动。每个进程都有自己的内存空间&#xff0c;包括代码、数据和系统资源。一个进程可以包含多个线程。…

内容分发功能升级!一站式搞定文案生成/违规检测/一键分发全流程

随着社交媒体的不断发展&#xff0c;越来越多的企业开始布局新媒体矩阵&#xff0c;从集团总部到区域门店、个人销售&#xff0c;从全品类到细分垂直类目、从单一平台到多平台&#xff0c;试图让品牌影响力覆盖更广泛群体&#xff0c; 当然&#xff0c;随之而来的&#xff0c;如…

深度学习”和“多层神经网络”的区别

在讨论深度学习与多层神经网络之间的差异时&#xff0c;我们必须首先理解它们各自是什么以及它们在计算机科学和人工智能领域的角色。 深度学习是一种机器学习的子集&#xff0c;它使用了人工神经网络的架构。深度学习的核心思想是模拟人脑神经元的工作方式&#xff0c;以建立…

RuntimeError: Placeholder storage has not been allocated on MPS device!解决方案

大家好,我是爱编程的喵喵。双985硕士毕业,现担任全栈工程师一职,热衷于将数据思维应用到工作与生活中。从事机器学习以及相关的前后端开发工作。曾在阿里云、科大讯飞、CCF等比赛获得多次Top名次。现为CSDN博客专家、人工智能领域优质创作者。喜欢通过博客创作的方式对所学的…

java 匿名内部类

匿名内部类&#xff08;类没有名字&#xff09;&#xff1a; 1、什么是内部类&#xff1f; 内部类&#xff1a;在类的内部又定义了一个新的类&#xff0c;被称为内部类。 2、内部类的分类&#xff1a; 静态内部类&#xff1a;类似于静态变量 实例内部类&#xff1a;类似于实例变…

Web安全测试基础

SQL注入 当下最常用的一个攻击手段&#xff0c;就是通过SQL命令插入到Web表单中或页面请求查询字符串中&#xff0c;最终达到欺骗服务器执行恶意的SQL语句的目的&#xff0c;SQL注入一旦成功&#xff0c;轻则直接绕开服务器验证&#xff0c;直接登录成功&#xff0c;重则将服务…

【Flutter 开发实战】Dart 基础篇:条件循环表达式

Dart 是一门强大的编程语言&#xff0c;其条件和循环表达式在编写灵活、高效代码中起着关键作用。本文将深入介绍 Dart 中的条件表达式、循环表达式、以及关键字如 for、while、do...while、break、continue 等内容&#xff0c;旨在为初学者提供清晰的指导。 1. 条件表达式 D…