tadams@llex.ll.mit.edu ( Tony Adams) (03/23/91)
machine: SUN 3E (SUNOS 4.03) with source code. During post-mortem examination of kernel core dumps, what is the most user level context, for a target process, that can be reconstructed?? Its easy to switch process context via "pid$<setproc". Then from there its easy to determine the user level register values by following "u.u_ar0". Subject to what was in-core at the time of the dump, are there any "canned" ways to locate and examine the target processes text, data and stack pages? Any help is appreciated.