1、in kernel config : CONFIG_COREDUMP=y
2、in android p
in bionic/linker/linker_main.cpp
disable signal handler(comment below code)
/*
#ifdef __ANDROID__
debuggerd_callbacks_t callbacks = {
.get_abort_message = []() {
return __libc_shared_globals()->abort_msg;
},
.post_dump = ¬ify_gdb_of_libraries,
};
debuggerd_init(&callbacks);
#endif
*/
in debuggerd_handler.cpp
@@ -577,5 +577,5 @@ void debuggerd_init(debuggerd_callbacks_t* callbacks) {
// Use the alternate signal stack if available so we can catch stack overflows.
action.sa_flags |= SA_ONSTACK;
- debuggerd_register_handlers(&action);
+ //debuggerd_register_handlers(&action);
in later android :
comment below codes:
void linker_debuggerd_init() {
// There may be a version mismatch between the bootstrap linker and the crash_dump in the APEX,
// so don't pass in any process info from the bootstrap linker.
// debuggerd_callbacks_t callbacks = {
//#if defined(__ANDROID_APEX__)
// .get_process_info = get_process_info,
//#endif
// .post_dump = notify_gdb_of_libraries,
// };
// debuggerd_init(&callbacks);
}
3、then in init rc file:
setrlimit 4 -1 -1
setrlimit core -1 -1
ulimit -c unlimited
write /proc/sys/fs/suid_dumpable 1
Write /proc/sys/kernel/core_uses_pid 1
mkdir /data/coredump 0777 system system
write /proc/sys/kernel/core_pattern /data/coredump/core.%e.%p
4、init/selinux.cpp
index 0ba5c4ae3..748c15b32 100644
--- a/init/selinux.cpp
+++ b/init/selinux.cpp
@@ -76,7 +76,7 @@ selabel_handle* sehandle = nullptr;
enum EnforcingStatus { SELINUX_PERMISSIVE, SELINUX_ENFORCING };
EnforcingStatus StatusFromCmdline() {
- EnforcingStatus status = SELINUX_ENFORCING;
+ EnforcingStatus status = SELINUX_PERMISSIVE;
5、kill -6 <test_pid> to see whether coredump generated ,if not ,please check if you have /data/ write permission and check /proc/<test_pid>/limits to see
whether your Max core file size /Soft limit is 0 (0 means you can't generate coredump).