Post-mortem kernel core dump

Tony Adams tadams at llex.ll.mit.edu
Tue Mar 26 08:00:00 AEST 1991


machine: SUN 3E (SUNOS 4.03) with source code.

During post-mortem examination of kernel core dumps, what is the most user
level context, for a target process, that can be reconstructed??

Its easy to switch process context via "pid$<setproc". Then from there its
easy to determine the user level register values by following "u.u_ar0".

And  to what was in-core at the time of the dump, are there any "canned" ways
to locate and examine the target processes text, data and stack pages?

Any help is appreciated.



More information about the Comp.sys.sun mailing list