`__1cIVMThreadDrun6M_v_+0x1b4
libjvm.so`__1cG_start6Fpv_0_+0x208
libc.so.1`_lwp_start
--- On Fri, 11/14/08, Adam Leventhal [EMAIL PROTECTED] wrote:
From: Adam Leventhal [EMAIL PROTECTED]
Subject: Re: [dtrace-discuss] truss -fall equivalent in DTrace
To: [EMAIL
Thanx a lot.
Can I get pstack equivalent script using DTrace?
One problem is if we call java from C (using JNI) such stacks are not shown in
pstack.
One more problem is running instance is hang thread lock can we have a script
which shows which all threads are causing deadlock?
--- On Fri,
On Fri, Nov 14, 2008 at 12:40:55AM -0800, [EMAIL PROTECTED] wrote:
Can I get pstack equivalent script using DTrace?
You can use ustack() at any probe.
Adam
--
Adam Leventhal, Fishworks http://blogs.sun.com/ahl
___
dtrace-discuss
First one note about your comparison with truss. As you said, truss follows
child processes when tracing system calls. But system calls != user-land
functions. Actually you can write dtrace script which will trace system calls
of your program and will follow forked child processes as well as
Check out Brendan Gregg's dtruss shell script (available from his web
site or as part of MacOSX Leopard). It emulates truss using dtrace,
including truss's -f option.
___
dtrace-discuss mailing list
dtrace-discuss@opensolaris.org
What I mean to ask is will PID provider trace child processes forked by the
parent process?
--- On Wed, 11/5/08, Angelo Rajadurai [EMAIL PROTECTED] wrote:
From: Angelo Rajadurai [EMAIL PROTECTED]
Subject: Re: [dtrace-discuss] truss -fall equivalent in DTrace
To: [EMAIL PROTECTED]
Cc
[EMAIL PROTECTED] wrote:
What I mean to ask is will PID provider trace child processes forked by the
parent process?
no. You need to trace fork/exec system calls (or similar events) and run a
new script (or the same again ...) with appropriate arguments (ie pid).
HTH
Michael
--
Michael
Change $1 to $target!
(ie)
./sample.d -c a.out
pid$target::somefunctionname:entry
{
printf(%s is called by %d,probefunc, tid);
}
In case you want to find the funcstions of a running process (say pid
1234)
you have two options.
./sample.d --p 1234
pid$target::somefunctionname:entry
{