On 01/25/16 00:18, STEVE wrote:
> Hi Nan Xiao,
> 
> Yes, it is unmount. Please see the man page below. I tried to run
> unmount and dtrace both under root, same issue.

Just a nit, but the section 2 man page doesn't document the syscall
interface.  It documents the libc ABI.  The two are different, and you
can't always trust that one matches the other.  A better place to look
for supported syscall provider interfaces is here:

dtrace -l -f syscall::\*mount\*

or, if you prefer:

dtrace -l -P syscall | grep mount

At a guess, the problem is that the executable invoking unmount() itself
was gone by the time the user-level dtrace got the information from the
kernel.

Since it seems you're looking for the user-level stack, I suggest
enabling destructive actions and using stop() to halt the user process.
 It can then be examined with a debugger.

-- 
James Carlson         42.703N 71.076W         <carls...@workingcode.com>


-------------------------------------------
dtrace-discuss
Archives: https://www.listbox.com/member/archive/184261/=now
RSS Feed: https://www.listbox.com/member/archive/rss/184261/25769126-e243886f
Modify Your Subscription: 
https://www.listbox.com/member/?member_id=25769126&id_secret=25769126-8d47a7b2
Powered by Listbox: http://www.listbox.com

Reply via email to