Kernel post-mortem core dump examination
Tony Adams
tadams at llex.ll.mit.edu
Sat Mar 23 02:17:16 AEST 1991
machine: SUN 3E (SUNOS 4.03) with source code.
During post-mortem examination of kernel core dumps, what is the
most user level context, for a target process, that can be
reconstructed??
Its easy to switch process context via "pid$<setproc". Then from
there its easy to determine the user level register values by
following "u.u_ar0".
Subject to what was in-core at the time of the dump, are there
any "canned" ways to locate and examine the target processes
text, data and stack pages?
Any help is appreciated.
More information about the Comp.unix.wizards
mailing list