post-mortem kernel core dump question
Tony Adams
tadams at llex.ll.mit.edu
Wed Mar 27 05:46:11 AEST 1991
machine: SUN 3E (SUNOS 4.03) with source code.
During post-mortem examination of kernel core dumps, what is the
most user level context, for a target process, that can be
reconstructed??
Its easy to switch process context via "pid$<setproc". Then from
there its easy to determine the user level register values by
following "u.u_ar0".
Subject to what was in-core at the time of the dump, are there
any "canned" ways to locate and examine the target processes
text, data and stack pages?
Any help is appreciated.
More information about the Comp.unix.questions
mailing list