From mboxrd@z Thu Jan 1 00:00:00 1970 From: Christian Convey Subject: Re: newbie question: tracing userspace call/return sequences Date: Sat, 7 Jan 2017 13:26:47 -0500 Message-ID: References: <87zij4nhvk.fsf@firstfloor.org> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Return-path: Received: from mail-qk0-f180.google.com ([209.85.220.180]:34219 "EHLO mail-qk0-f180.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932653AbdAGS0s (ORCPT ); Sat, 7 Jan 2017 13:26:48 -0500 Received: by mail-qk0-f180.google.com with SMTP id a20so105983674qkc.1 for ; Sat, 07 Jan 2017 10:26:48 -0800 (PST) In-Reply-To: Sender: linux-perf-users-owner@vger.kernel.org List-ID: To: Namhyung Kim Cc: linux-perf-users On Fri, Jan 6, 2017 at 11:37 PM, Namhyung Kim wrote: ... > You can use uftrace for function tracing. It doesn't have a hardware dependency > but you need to rebuild your program with instrumentation enabled (like -pg > or -finstrument-functions in gcc). > > https://github.com/namhyung/uftrace Thanks Namhyung. For one of my current projects, I'm limited to tools which don't require me to recompile / relink the target program. So I'm limited to options such as Perf, Systemtap, Gdb, or Intel Pin. - Christian