From mboxrd@z Thu Jan 1 00:00:00 1970 From: Christian Convey Subject: Re: newbie question: tracing userspace call/return sequences Date: Fri, 6 Jan 2017 14:07:19 -0500 Message-ID: References: <87zij4nhvk.fsf@firstfloor.org> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Return-path: Received: from mail-qt0-f178.google.com ([209.85.216.178]:36322 "EHLO mail-qt0-f178.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S936366AbdAFTHU (ORCPT ); Fri, 6 Jan 2017 14:07:20 -0500 Received: by mail-qt0-f178.google.com with SMTP id k15so316766284qtg.3 for ; Fri, 06 Jan 2017 11:07:20 -0800 (PST) In-Reply-To: <87zij4nhvk.fsf@firstfloor.org> Sender: linux-perf-users-owner@vger.kernel.org List-ID: To: Andi Kleen Cc: linux-perf-users@vger.kernel.org > Use the right tool for the job. > > On Intel, use a Broadwell or Skylake or Goldmont and use processor trace. > > perf record -e intel_pt//u foo > perf script --itrace=cr Hi Andi, Thanks for the idea. It sounds promising. Unfortunately for my current situation, the CPU's on which I need to run this are too old to have intel_pt. - Christian