From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andi Kleen Subject: Re: newbie question: tracing userspace call/return sequences Date: Fri, 06 Jan 2017 10:49:35 -0800 Message-ID: <87zij4nhvk.fsf@firstfloor.org> References: Mime-Version: 1.0 Content-Type: text/plain Return-path: Received: from mga09.intel.com ([134.134.136.24]:54107 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754447AbdAFStg (ORCPT ); Fri, 6 Jan 2017 13:49:36 -0500 In-Reply-To: (Christian Convey's message of "Thu, 5 Jan 2017 22:49:13 -0500") Sender: linux-perf-users-owner@vger.kernel.org List-ID: To: Christian Convey Cc: linux-perf-users@vger.kernel.org Christian Convey writes: > > Any suggestions for a good/better way to pull this off? Use the right tool for the job. On Intel, use a Broadwell or Skylake or Goldmont and use processor trace. perf record -e intel_pt//u foo perf script --itrace=cr -Andi