[comp.unix.questions] post-mortem kernel core dump question

tadams@llex.ll.mit.edu ( Tony Adams) (03/27/91)

machine: SUN 3E (SUNOS 4.03) with source code.

During post-mortem examination of kernel core dumps, what is the
most user level context, for a target process, that can be
reconstructed??

Its easy to switch process context via "pid$<setproc". Then from
there its easy to determine the user level register values by
following "u.u_ar0".

Subject to what was in-core at the time of the dump, are there
any "canned" ways to locate and examine the target processes
text, data and stack pages?

Any help is appreciated.