COREADM(8)           Maintenance Commands and Procedures          COREADM(8)
NAME
       coreadm - core file administration
SYNOPSIS
       coreadm [
-g pattern] [
-G content] [
-i pattern] [
-I content]
            [
-d option]... [
-e option]...       
coreadm [
-p pattern] [
-P content] [
pid]...
DESCRIPTION
       coreadm specifies the name and location of core files produced by
       abnormally-terminating processes. See 
core(5).
       Only users and roles that belong to the "Maintenance and Repair" RBAC
       profile can execute the first form of the 
SYNOPSIS. This form
       configures system-wide core file options, including a global core
       file name pattern and a core file name pattern for the 
init(8)       process. All settings are saved persistently and will be applied at
       boot.
       Non-privileged users can execute the second form of the 
SYNOPSIS.
       This form specifies the file name pattern and core file content that
       the operating system uses to generate a per-process core file.
       A core file name pattern is a normal file system path name with
       embedded variables, specified with a leading 
% character. The
       variables are expanded from values that are effective when a core
       file is generated by the operating system. The possible embedded
       variables are as follows:       
%d           Executable file directory name, up to a maximum of 
MAXPATHLEN           characters       
%f           Executable file name, up to a maximum of 
MAXCOMLEN characters       
%g           Effective group-
ID       %m           Machine name (
uname -m)       
%n           System node name (
uname -n)       
%p           Process-
ID       %t           Decimal value of 
time(2)       %u           Effective user-
ID       %z           Name of the zone in which process executed (
zonename)       
%Z           The path to the root of the zone in which process executed       
%%           Literal 
%       For example, the core file name pattern 
/var/cores/core.%f.%p would
       result, for command 
foo with process-
ID 1234, in the core file name       
/var/cores/core.foo.1234.
       A core file content description is specified using a series of tokens
       to identify parts of a process's binary image:       
anon           Anonymous private mappings, including thread stacks that are not
           main thread stacks       
ctf           CTF type information sections for loaded object files       
data           Writable private file mappings       
debug           Debug sections, commonly DWARF. All sections that begin with
           '.debug_'.  Note, this does capture non-DWARF related sections
           that begin with the string pattern; however, at this time other
           debug formats such as STABS are not included. Other debug formats
           would be included here in the future.       
dism           DISM mappings       
heap           Process heap       
ism           ISM mappings       
rodata           Read-only private file mappings       
shanon           Anonymous shared mappings       
shfile           Shared mappings that are backed by files       
shm           System V shared memory       
stack           Process stack       
symtab           Symbol table sections for loaded object files       
text           Readable and executable private file mappings
       In addition, you can use the token 
all to indicate that core files
       should include all of these parts of the process's binary image. You
       can use the token 
none to indicate that no mappings are to be
       included. The 
default token indicates inclusion of the system default
       content
       (
stack+heap+shm+ism+dism+text+data+rodata+anon+shanon+ctf+symtab).
       The 
/proc file system data structures are always present in core
       files regardless of the mapping content.
       You can use 
+ and 
- to concatenate tokens. For example, the core file
       content 
default-ism would produce a core file with the default set of
       mappings without any intimate shared memory mappings.
       The 
coreadm command with no arguments reports the current system
       configuration, for example:
         $ coreadm
             global core file pattern: /var/cores/core.%f.%p
             global core file content: all
               init core file pattern: core
               init core file content: default
                    global core dumps: enabled
               per-process core dumps: enabled
              global setid core dumps: enabled
         per-process setid core dumps: disabled
             global core dump logging: disabled
       The 
coreadm command with only a list of process-
IDs reports each
       process's per-process core file name pattern, for example:
         $ coreadm 278 5678
           278:   core.%f.%p default
           5678:  /home/george/cores/%f.%p.%t all-ism
       Only the owner of a process or a user with the 
proc_owner privilege
       can interrogate a process in this manner.
       When a process is dumping core, up to three core files can be
       produced: one in the per-process location, one in the system-wide
       global location, and, if the process was running in a local (non-
       global) zone, one in the global location for the zone in which that
       process was running. Each core file is generated according to the
       effective options for the corresponding location.
       When generated, a global core file is created in mode 
600 and owned
       by the superuser. Nonprivileged users cannot examine such files.
       Ordinary per-process core files are created in mode 
600 under the
       credentials of the process. The owner of the process can examine such
       files.
       A process that is or ever has been 
setuid or 
setgid since its last       
exec(2) presents security issues that relate to dumping core.
       Similarly, a process that initially had superuser privileges and lost
       those privileges through 
setuid(2) also presents security issues that
       are related to dumping core. A process of either type can contain
       sensitive information in its address space to which the current
       nonprivileged owner of the process should not have access. If 
setid       core files are enabled, they are created mode 
600 and owned by the
       superuser.
OPTIONS
       The following options are supported:       
-d option...
           Disable the specified core file option. See the 
-e option for
           descriptions of possible options.
           Multiple 
-e and 
-d options can be specified on the command line.
           Only users and roles belonging to the "Maintenance and Repair"
           RBAC profile can use this option.       
-e option...
           Enable the specified core file option. Specify 
option as one of
           the following:           
global               Allow core dumps that use global core pattern.           
global-setid               Allow set-id core dumps that use global core pattern.           
log               Generate a 
syslog(3C) message when generation of a global
               core file is attempted.           
process               Allow core dumps that use per-process core pattern.           
proc-setid               Allow set-id core dumps that use per-process core pattern.
               Multiple 
-e and 
-d options can be specified on the command
               line.  Only users and roles belonging to the "Maintenance and
               Repair" RBAC profile can use this option.       
-g pattern           Set the global core file name pattern to 
pattern. The pattern
           must start with a 
/ and can contain any of the special 
%           variables that are described in the 
DESCRIPTION.
           Only users and roles belonging to the "Maintenance and Repair"
           RBAC profile can use this option.       
-G content           Set the global core file content to content. You must specify
           content by using the tokens that are described in the           
DESCRIPTION.
           Only users and roles belonging to the "Maintenance and Repair"
           RBAC profile can use this option.       
-i pattern           Set the default per-process core file name to 
pattern. This
           changes the per-process pattern for any process whose per-process
           pattern is still set to the default. Processes that have had
           their per-process pattern set or are descended from a process
           that had its per-process pattern set (using the 
-p option) are
           unaffected. This default persists across reboot.
           Only users and roles belonging to the "Maintenance and Repair"
           RBAC profile can use this option.       
-I content           Set the default per-process core file content to 
content. This
           changes the per-process content for any process whose per-process
           content is still set to the default. Processes that have had
           their per-process content set or are descended from a process
           that had its per-process content set (using the 
-P option) are
           unaffected. This default persists across reboot.
           Only users and roles belonging to the "Maintenance and Repair"
           RBAC profile can use this option.       
-p pattern           Set the per-process core file name pattern to 
pattern for each of
           the specified process-
IDs. The pattern can contain any of the
           special 
% variables described in the 
DESCRIPTION and need not
           begin with 
/.  If the pattern does not begin with 
/, it is
           evaluated relative to the directory that is current when the
           process generates a core file.
           A nonprivileged user can apply the 
-p option only to processes
           that are owned by that user. A user with the 
proc_owner privilege
           can apply the option to any process. The per-process core file
           name pattern is inherited by future child processes of the
           affected processes. See 
fork(2).
           If no process-
IDs are specified, the 
-p option sets the per-
           process core file name pattern to 
pattern on the parent process
           (usually the shell that ran 
coreadm).       
-P content           Set the per-process core file content to 
content for each of the
           specified process-IDs. The content must be specified by using the
           tokens that are described in the 
DESCRIPTION.
           A nonprivileged user can apply the 
-p option only to processes
           that are owned by that user. A user with the 
proc_owner privilege
           can apply the option to any process. The per-process core file
           name pattern is inherited by future child processes of the
           affected processes. See 
fork(2).
           If no process-
IDs are specified, the 
-P option sets the per-
           process file content to 
content on the parent process (usually
           the shell that ran 
coreadm).
OPERANDS
       The following operands are supported:       
pid           process-
IDEXAMPLES
       Example 1: Setting the Core File Name Pattern
       When executed from a user's 
$HOME/.profile or 
$HOME/.login, the
       following command sets the core file name pattern for all processes
       that are run during the login session:
         example$  coreadm -p core.%f.%p
       Note that since the process-
ID is omitted, the per-process core file
       name pattern will be set in the shell that is currently running and
       is inherited by all child processes.
       Example 2: Dumping a User's Files Into a Subdirectory
       The following command dumps all of a user's core dumps into the       
corefiles subdirectory of the home directory, discriminated by the
       system node name. This command is useful for users who use many
       different machines but have a shared home directory.
         example$  coreadm -p $HOME/corefiles/%n.%f.%p 1234
       Example 3: Culling the Global Core File Repository
       The following commands set up the system to produce core files in the
       global repository only if the executables were run from 
/usr/bin or       
/usr/sbin.
         example# mkdir -p /var/cores/usr/bin
         example# mkdir -p /var/cores/usr/sbin
         example# coreadm -G all -g /var/cores/%d/%f.%p.%n
FILES
       /var/cores           Directory provided for global core file storage.
EXIT STATUS
       The following exit values are returned:       
0           Successful completion.       
1           A fatal error occurred while either obtaining or modifying the
           system core file configuration.       
2           Invalid command-line options were specified.
SEE ALSO
       gcore(1), 
pfexec(1), 
svcs(1), 
exec(2), 
fork(2), 
setuid(2), 
time(2),       
syslog(3C), 
core(5), 
prof_attr(5), 
user_attr(5), 
attributes(7),       
smf(7), 
init(8), 
svcadm(8)NOTES
       In a local (non-global) zone, the global settings apply to processes
       running in that zone. In addition, the global zone's apply to
       processes run in any zone.
       The term 
global settings refers to settings which are applied to the
       system or zone as a whole, and does not necessarily imply that the
       settings are to take effect in the global zone.
       The 
coreadm service is managed by the service management facility,       
smf(7), under the service identifier:
         svc:/system/coreadm:default
       Administrative actions on this service, such as enabling, disabling,
       or requesting restart, can be performed using 
svcadm(8). The
       service's status can be queried using the 
svcs(1) command.
       The 
-g, 
-G, 
-i, 
-I, 
-e, and 
-d options can be also used by a user,
       role, or profile that has been granted both the       
solaris.smf.manage.coreadm and 
solaris.smf.value.coreadm       authorizations.
                               August 3, 2021                     COREADM(8)