Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp281658imu; Fri, 16 Nov 2018 02:27:12 -0800 (PST) X-Google-Smtp-Source: AJdET5e4BKTxlV1wx3K5iETT4nJpZJMDjwtbBZY7qpwrJ1VngC4+Yhns2q0dwS9WjCz5jxp4aztX X-Received: by 2002:a17:902:3084:: with SMTP id v4-v6mr10026031plb.326.1542364032752; Fri, 16 Nov 2018 02:27:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542364032; cv=none; d=google.com; s=arc-20160816; b=ehxt0BoI8yfulg1cYP8cPm2x+maH+qJzhSongmqoA+ODDlYbmybDHB4tiCjFdx4MV7 6U2nDd6fgEA1nV50FpFLXIoelXDmj7xt78ElJRn1MDDOdckj2SkBEhEldKmS7WQ9Ts2M UUiiTT5EQ+XyMaDWQklnTO4tpBkjKRwFTRwqP8MJ/mHC77aMq6UjosZt6PaLK01Chy0f oc+sXGcZJ/ItqkyoqOKoyph1mtu0ijYLtUi73+OT4QKyLX+tDi8m5uGDy7bnmU0SA+ky a3FLm9HTaneeWGS4nDtSTUSoiH1oeDJ9bLjy7BShRclADwwUxU0KCmCxsqXr+GsJWDae z9gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=EATkcLXW0nvW5en6m/NjpT1k1j5eD8511GS+rXfNJk8=; b=OlBeHTn61+652pRPElNXOyGOu6ECl6XES7bSq1T41skpCVXlduhYEAjJg4GUSAuP8f ddpP6JwK6oKoQpQAb0LvtrN1iihK7m0O3tMfFuTejyGibbxYLEr9O0DMBay+QI+6FGEF flcWFPfYU15DHqVux8ihmYoIGXfks/dCG93OpTM4oUGC6CJPSQ5pFz7CKkiTiDNpb7gi gEu3yZqIwuLQWjbsbdZ4nwh3q/fQMjIDS8ghYQe9RhSvmepEAUuug47GxWVSOUrQyDkO NciQKIqBATfO9hNz+ii78IhyHY7xyFezBnvQCYnbsY7JWeY7LBgP9LOHsQk8xK/rTd4g Lprw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h1-v6si31466172pld.332.2018.11.16.02.26.58; Fri, 16 Nov 2018 02:27:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389687AbeKPUgk (ORCPT + 99 others); Fri, 16 Nov 2018 15:36:40 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:48918 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727681AbeKPUgj (ORCPT ); Fri, 16 Nov 2018 15:36:39 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 23B9415AD; Fri, 16 Nov 2018 02:24:57 -0800 (PST) Received: from e119886-lin.cambridge.arm.com (unknown [10.37.6.11]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1BCF43F5BD; Fri, 16 Nov 2018 02:24:53 -0800 (PST) From: Andrew Murray To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Shawn Guo , Sascha Hauer , Will Deacon , Mark Rutland , Benjamin Herrenschmidt , Thomas Gleixner , Borislav Petkov , x86@kernel.org Cc: linux-alpha@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH 10/10] perf/doc: update design.txt for exclude_{host|guest} flags Date: Fri, 16 Nov 2018 10:24:13 +0000 Message-Id: <1542363853-13849-11-git-send-email-andrew.murray@arm.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1542363853-13849-1-git-send-email-andrew.murray@arm.com> References: <1542363853-13849-1-git-send-email-andrew.murray@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Update design.txt to reflect the presence of the exclude_host and exclude_guest perf flags. Signed-off-by: Andrew Murray --- tools/perf/design.txt | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/tools/perf/design.txt b/tools/perf/design.txt index a28dca2..7de7d83 100644 --- a/tools/perf/design.txt +++ b/tools/perf/design.txt @@ -222,6 +222,10 @@ The 'exclude_user', 'exclude_kernel' and 'exclude_hv' bits provide a way to request that counting of events be restricted to times when the CPU is in user, kernel and/or hypervisor mode. +Furthermore the 'exclude_host' and 'exclude_guest' bits provide a way +to request counting of events restricted to guest and host contexts when +using virtualisation. + The 'mmap' and 'munmap' bits allow recording of PROT_EXEC mmap/munmap operations, these can be used to relate userspace IP addresses to actual code, even after the mapping (or even the whole process) is gone, -- 2.7.4