post-mortem kernel core dump question

Tony Adams tadams at llex.ll.mit.edu
Wed Mar 27 05:46:11 AEST 1991




machine: SUN 3E (SUNOS 4.03) with source code.

During post-mortem examination of kernel core dumps, what is the
most user level context, for a target process, that can be
reconstructed??

Its easy to switch process context via "pid$<setproc". Then from
there its easy to determine the user level register values by
following "u.u_ar0".

Subject to what was in-core at the time of the dump, are there
any "canned" ways to locate and examine the target processes
text, data and stack pages?

Any help is appreciated.



More information about the Comp.unix.questions mailing list