[comp.sys.sun] Post-mortem kernel core dump

tadams@llex.ll.mit.edu ( Tony Adams) (03/26/91)

machine: SUN 3E (SUNOS 4.03) with source code.

During post-mortem examination of kernel core dumps, what is the most user
level context, for a target process, that can be reconstructed??

Its easy to switch process context via "pid$<setproc". Then from there its
easy to determine the user level register values by following "u.u_ar0".

And  to what was in-core at the time of the dump, are there any "canned" ways
to locate and examine the target processes text, data and stack pages?

Any help is appreciated.