That's a bug and a rather odd one at that. Please submit it on
bugs.opensolaris.org. We'll take a look.

Adam

On Wed, Aug 06, 2008 at 06:57:57PM +0200, Michael Mueller wrote:
> In Solaris 10 6/06, etc. I used to do things like
> 
>    pid$target::malloc:entry
>    {
>          ustack();
>    }
> 
> and got stack traces from my application calling malloc as expected. In 
> Solaris 10 8/07 I only see stack traces from functions inside libc 
> calling a function called lmalloc() but not my malloc calls:
> 
>                ld.so.1`lmalloc
>                ld.so.1`tsort+0xb4
>                ld.so.1`load_completion+0x7c
>                ld.so.1`elf_bndr+0x3d8
>                ld.so.1`elf_rtbndr+0x10
>                libc.so.1`0xff36f30c
>                libc.so.1`_ndoprnt+0x32c
>                libc.so.1`printf+0xf4
>                memleak`fun1+0x94
>                memleak`main+0x4
>                memleak`_start+0x5c
> 
> If I change the probe specification to
> 
>    pid$target:libc:malloc:entry       # specify the module: libc
> 
> it works again. Is this another bug? It's at least confusing and unexpected.
> _______________________________________________
> dtrace-discuss mailing list
> [email protected]

-- 
Adam Leventhal, Fishworks                     http://blogs.sun.com/ahl
_______________________________________________
dtrace-discuss mailing list
[email protected]

Reply via email to