fche changed the topic of #systemtap to: http://sourceware.org/systemtap; email systemtap@sourceware.org if answers here not timely, conversations may be logged
<misha354>
I'm profiling performance problems with the BIND DNS daemon. I've been able to generate a flame graph showing all the functions called by the kernel, but the call stacks end at entry_SYSCALL_64_fastpath(). How would I go about seeing what BIND functions are making that call?
<misha354>
I'm collecting the stack trace data using systemtap