1 .\" Copyright (c) 1983, 1990, 1992, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 4. Neither the name of the University nor the names of its contributors
13 .\" may be used to endorse or promote products derived from this software
14 .\" without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 .\" @(#)gcore.1 8.2 (Berkeley) 4/18/94
36 .Nd get core images of running process
47 utility creates a core image of the specified process,
50 By default, the core is written to the file
52 The process identifier,
54 must be given on the command line.
56 The following options are available:
57 .Bl -tag -width indent
59 Write the core file to the specified file instead of
62 Dumps all available segments, excluding only malformed and undumpable segments.
63 Unlike the default invocation, this flag dumps mappings of devices which
64 may invalidate the state of device transactions or trigger other unexpected
66 As a result, this flag should only be used when the behavior of the
67 application and any devices it has mapped is fully understood and any side
68 effects can be controlled or tolerated.
70 Stop the process while gathering the core image, and resume it
72 This guarantees that the resulting core dump will
73 be in a consistent state.
74 The process is resumed even if it was
76 The same effect can be achieved manually with
80 .Bl -tag -width /var/log/messages -compact
94 may not work with processes which are actively being investigated with
98 Additionally, interruptable sleeps may exit with EINTR.
102 utility is not compatible with the original