VxWorks 7: VxWorks Kernel Shell

Learn how the kernel shell provides command shell access to your target.

Limited availability | See below

rate limit

Code not recognized.

About this course

The kernel shell is a core tool to execute, monitor, and debug kernel and real-time process code.  This set of topics covers configuration and usage of the VxWorks kernel shell, and explains the Object Module Loader.

Product: VxWorks 7
Based on: SR540
Applicable for: All VxWorks 7

VxWorks® Kernel Shell

The kernel shell is a target-resident, command line interface provided by the VxWorks operating system. You use it to interact with VxWorks directly, through the target’s console serial port. 

You do not need to use Workbench to access the kernel shell, but Workbench does contain a terminal view you can use to attach to the serial console. 

You can use the kernel shell to navigate to project object files on both remote and local file systems, and to load object files to the target. You can also spawn tasks, do rudimentary run control on them, and debug them. You can also interrogate target memory from the kernel shell.

Course Syllabus:

 

About this course

The kernel shell is a core tool to execute, monitor, and debug kernel and real-time process code.  This set of topics covers configuration and usage of the VxWorks kernel shell, and explains the Object Module Loader.

Product: VxWorks 7
Based on: SR540
Applicable for: All VxWorks 7

VxWorks® Kernel Shell

The kernel shell is a target-resident, command line interface provided by the VxWorks operating system. You use it to interact with VxWorks directly, through the target’s console serial port. 

You do not need to use Workbench to access the kernel shell, but Workbench does contain a terminal view you can use to attach to the serial console. 

You can use the kernel shell to navigate to project object files on both remote and local file systems, and to load object files to the target. You can also spawn tasks, do rudimentary run control on them, and debug them. You can also interrogate target memory from the kernel shell.

Course Syllabus: