Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
dtrace -n 'syscall::bind:entry{ ustack(); }'
dtrace: description 'syscall::bind:entry' matched 1 probe
CPU ID FUNCTION:NAME
9 414 bind:entry
libc.so.1`_so_bind+0xa
node`uv__bind+0x7b
node`uv__tcp_bind+0x23
node`_ZN4node7TCPWrap4BindERKN2v89ArgumentsE+0xb6
node`_ZN2v88internalL21Builtin_HandleApiCallENS0_12_GLOBAL__N_116BuiltinArgumentsILNS0_21BuiltinExtraArgumentsE1EEEPNS0_7IsolateE+0x1ab
0x47e1d06362
0x47e1d62432
0x47e1d6199c
0x47e1d5cff9
0x47e1d0ccce
0x47e1d5c3ed
0x47e1d0ccce
0x47e1d53d87
0x47e1d0d507
0x47e1d06116
node`_ZN2v88internalL6InvokeEbNS0_6HandleINS0_10JSFunctionEEENS1_INS0_6ObjectEEEiPS5_Pb+0xfa
node`_ZN2v88internal9Execution4CallENS0_6HandleINS0_6ObjectEEES4_iPS4_Pbb+0xcb
node`_ZN2v86Script3RunEv+0x138
node`_ZN4node13WrappedScript11EvalMachineILNS0_14EvalInputFlagsE0ELNS0_16EvalContextFlagsE0ELNS0_15EvalOutputFlagsE0EEEN2v86HandleINS5_5ValueEEERKNS5_9ArgumentsE+0xba
node`_ZN4node13WrappedScript23CompileRunInThisContextERKN2v89ArgumentsE+0x9
1 414 bind:entry
libc.so.1`_so_bind+0x15
_socket.so`sock_bind+0x6a
libpython2.7.so.1.0`PyCFunction_Call+0xa8
libpython2.7.so.1.0`PyEval_EvalFrameEx+0x43a9
libpython2.7.so.1.0`PyEval_EvalCodeEx+0x7a8
libpython2.7.so.1.0`function_call+0xa4
libpython2.7.so.1.0`PyObject_Call+0x5c
_functools.so`partial_call+0xc1
libpython2.7.so.1.0`PyObject_Call+0x5c
libpython2.7.so.1.0`PyEval_EvalFrameEx+0x1dae
libpython2.7.so.1.0`PyEval_EvalCodeEx+0x7a8
libpython2.7.so.1.0`PyEval_EvalCode+0x63
libpython2.7.so.1.0`run_mod+0x49
libpython2.7.so.1.0`PyRun_InteractiveOneFlags+0x146
libpython2.7.so.1.0`PyRun_InteractiveLoopFlags+0x5b
libpython2.7.so.1.0`PyRun_AnyFileExFlags+0x4e
libpython2.7.so.1.0`Py_Main+0xdbc
python2.7`main+0x27
python2.7`_start+0x83
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.