Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Thu, 14 Feb 2002 11:11:33 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Thu, 14 Feb 2002 11:11:15 -0500 Received: from [66.150.46.254] ([66.150.46.254]:34882 "EHLO mail.tvol.net") by vger.kernel.org with ESMTP id ; Thu, 14 Feb 2002 11:11:03 -0500 Message-ID: <3C6BE18F.7B849129@wgate.com> Date: Thu, 14 Feb 2002 11:10:55 -0500 From: Michael Sinz Organization: WorldGate Communications Inc. X-Mailer: Mozilla 4.76 [en] (X11; U; FreeBSD 4.5-STABLE i386) X-Accept-Language: en MIME-Version: 1.0 To: Linux Kernel List Subject: [PATCH] Core dump file control Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org I have, for a long time, wished that Linux had a way to specify where core dumps are stored and what the name of the core dump is. Now that I have been building large linux clusters with many diskless nodes, this need has become even more important. What I did with this patch is provide a new sysctl that lets you control the name of the core file. The this name is actually a format string such that certain values from the process can be included. The sysctl is kernel.core_name_format and is a string up to 63 characters (plus 1 for the null) The following format options are available in that string: %P The Process ID (current->pid) %U The UID of the process (current->uid) %N The command name of the process (current->comm) %H The nodename of the system (system_utsname.nodename) %% A "%" For example, in my clusters, I have an NFS R/W mount at /coredumps that all nodes have access to. The format string I use is: sysctl -w "kernel.core_name_format=/coredumps/%H-%N-%P.core" This then causes core dumps to be of the format: /coredumps/whale.sinz.org-badprogram-13917.core Only behavior of appending the PID to the "core" name is still supported with the added logic of only doing so if the PID is not already part of the name format. The default name format is still just "core" to match old behavior. NOTE - I was tempted to change the default format to be something like "%N.core" which would at least identify the program that caused the core file. However, I can do that as part of my init process so it is not a issue here. The attached patch is for Linux 2.4.17 but should patch relatively easily to other versions. I tried to commend the code a bit to explain the how and why. ----------------- diff -urP linux-2.4.17/include/linux/sysctl.h linux.patch/include/linux/sysctl.h --- linux-2.4.17/include/linux/sysctl.h Mon Nov 26 08:29:17 2001 +++ linux.patch/include/linux/sysctl.h Thu Feb 14 08:23:59 2002 @@ -124,6 +124,7 @@ KERN_CORE_USES_PID=52, /* int: use core or core.%pid */ KERN_TAINTED=53, /* int: various kernel tainted flags */ KERN_CADPID=54, /* int: PID of the process to notify on CAD */ + KERN_CORE_NAME_FORMAT=55, /* string: core file name format string */ }; diff -urP linux-2.4.17/kernel/sysctl.c linux.patch/kernel/sysctl.c --- linux-2.4.17/kernel/sysctl.c Fri Dec 21 12:42:04 2001 +++ linux.patch/kernel/sysctl.c Thu Feb 14 08:26:15 2002 @@ -49,6 +49,7 @@ extern int max_queued_signals; extern int sysrq_enabled; extern int core_uses_pid; +extern char core_name_format[]; extern int cad_pid; /* this is needed for the proc_dointvec_minmax for [fs_]overflow UID and GID */ @@ -171,6 +172,8 @@ 0644, NULL, &proc_dointvec}, {KERN_CORE_USES_PID, "core_uses_pid", &core_uses_pid, sizeof(int), 0644, NULL, &proc_dointvec}, + {KERN_CORE_NAME_FORMAT, "core_name_format", core_name_format, 64, + 0644, NULL, &proc_doutsstring, &sysctl_string}, {KERN_TAINTED, "tainted", &tainted, sizeof(int), 0644, NULL, &proc_dointvec}, {KERN_CAP_BSET, "cap-bound", &cap_bset, sizeof(kernel_cap_t), diff -urP linux-2.4.17/fs/exec.c linux.patch/fs/exec.c --- linux-2.4.17/fs/exec.c Fri Dec 21 12:41:55 2001 +++ linux.patch/fs/exec.c Thu Feb 14 10:00:16 2002 @@ -35,6 +35,7 @@ #include #include #include +#include #define __NO_VERSION__ #include @@ -48,6 +49,12 @@ int core_uses_pid; +/* The format string for the core file name... + We default to "core" such that past behavior + remains unchanged. The 64 character limit is + arbitrary but must match the sysctl table. */ +char core_name_format[64] = {"core"}; + static struct linux_binfmt *formats; static rwlock_t binfmt_lock = RW_LOCK_UNLOCKED; @@ -933,14 +940,37 @@ __MOD_DEC_USE_COUNT(old->module); } +/* This is the maximum expanded core file name. We use + a reasonable number here since we use the stack to + do the expansion. However, the number should be big + enough to handle a reasonable command name plus PID + and/or UID in addition to the file name part that + is in the core_name_format string. */ +#define MAX_CORE_NAME (160) + int do_coredump(long signr, struct pt_regs * regs) { struct linux_binfmt * binfmt; - char corename[6+sizeof(current->comm)+10]; struct file * file; struct inode * inode; int retval = 0; + int fmt_i; + int name_n; + int addPID; + char *cname; + + /* The +11 is here to simplify the code path. What + we do is always check that we are less than MAX + but there are times when we also need to append + a number (such as the PID or UID). Rather than + using another temporary buffer, we provide for + enough extra space such that those numbers can + be added in one gulp even if we are just under + the MAX_CORE_NAME. Reduction in complexity of + the code path means a more reliable implementation. */ + char corename[MAX_CORE_NAME + 1 + 11]; + lock_kernel(); binfmt = current->binfmt; if (!binfmt || !binfmt->core_dump) @@ -951,10 +981,92 @@ if (current->rlim[RLIMIT_CORE].rlim_cur < binfmt->min_coredump) goto fail; - memcpy(corename,"core.", 5); - corename[4] = '\0'; - if (core_uses_pid || atomic_read(¤t->mm->mm_users) != 1) - sprintf(&corename[4], ".%d", current->pid); + /* Set this to true if we are going to add the PID. If the PID + already is added in the format we will end up clearing this. + The purpose is to provide for the old behavior of adding the + PID to the core file name but to not add it if it already + was included via the file name format pattern. */ + addPID = (core_uses_pid || atomic_read(¤t->mm->mm_users) != 1); + + /* Build the core file name as needed from the format string */ + for (fmt_i=0, name_n=0; + name_n < MAX_CORE_NAME && core_name_format[fmt_i]; + fmt_i++) + { + switch (core_name_format[fmt_i]) + { + case '%': /* A format character */ + fmt_i++; + switch (core_name_format[fmt_i]) + { + case '%': /* The way we get this character */ + corename[name_n++] = '%'; + break; + + case 'N': /* Process name */ + cname=current->comm; + + /* Only copy as much as will fit within the + MAX_CORE_NAME */ + while (*cname && (name_n < MAX_CORE_NAME)) + { + if (*cname != '/') + corename[name_n++] = *cname; + cname++; + } + break; + + case 'H': /* Node name */ + cname=system_utsname.nodename; + + /* Only copy as much as will fit within the + MAX_CORE_NAME */ + while (*cname && (name_n < MAX_CORE_NAME)) + { + if (*cname != '/') + corename[name_n++] = *cname; + cname++; + } + break; + + case 'P': /* Process PID */ + /* Since we are adding it here, don't append */ + addPID=0; + + /* We don't need to pre-check that the number + fits since we added a padding of 11 + characters to the end of the string buffer + just so that we don't need to do an extra + check */ + name_n += sprintf(&corename[name_n],"%d",current->pid); + break; + + case 'U': /* UID of the process */ + /* We don't need to pre-check that the number + fits since we added a padding of 11 + characters to the end of the string buffer + just so that we don't need to do an extra + check */ + name_n += sprintf(&corename[name_n],"%d",current->uid); + break; + } + break; + + default: /* Anything else just pass along */ + corename[name_n++] = core_name_format[fmt_i]; + } + } + + /* If we still want to append the PID and there is room, do so */ + /* This is to preserve current behavior */ + if (addPID && (name_n < MAX_CORE_NAME)) + { + name_n += sprintf(&corename[name_n],".%d",current->pid); + } + + /* And make sure to null terminate the string */ + corename[name_n]='\0'; + file = filp_open(corename, O_CREAT | 2 | O_NOFOLLOW, 0600); if (IS_ERR(file)) goto fail; -- Michael Sinz ---- Worldgate Communications ---- msinz@wgate.com A master's secrets are only as good as the master's ability to explain them to others. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/