diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/_index.md b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/_index.md new file mode 100644 index 000000000..10ad88752 --- /dev/null +++ b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/_index.md @@ -0,0 +1,39 @@ +--- +title: Get started with WindowsPerf WPA Plugin + +minutes_to_complete: 15 + +who_is_this_for: This is an introductory topic for software developers working on laptops and desktops and new to the Arm architecture. + +learning_objectives: + - Install WindowsPerf WPA Plugin on Windows + - Import a WindowsPerf counting timeline as a .json file in WPA + - Visualize the timeline in WPA using the Windowsperf WPA Plugin + +prerequisites: + - Windows desktop or development machine + - Windows Performance Analyzer installed + - WindowsPerf WPA Plugin installed + - (Optional) [WindowsPerf](/install-guides/wperf/) installed on a WoA machine [(Installation guide)](/install-guides/wperf/) + +author_primary: Alaaeddine Chakroun + +### Tags +skilllevels: Introductory +subjects: Performance and Architecture +armips: + - Cortex-A + - neoverse +operatingsystems: + - Windows +tools_software_languages: + - WindowsPerf + - perf + - Windows Performance Analyzer + +### FIXED, DO NOT MODIFY +# ================================================================================ +weight: 1 # _index.md always has weight of 1 to order correctly +layout: "learningpathall" # All files under learning paths have this same wrapper +learning_path_main_page: "yes" # This should be surfaced when looking for related content. Only set for _index.md of learning path content. +--- diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/_next-steps.md b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/_next-steps.md new file mode 100644 index 000000000..a80b670d2 --- /dev/null +++ b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/_next-steps.md @@ -0,0 +1,42 @@ +--- +next_step_guidance: Now that you have an idea of how the WindowsPerf WPA Plugin works, You can try exploring the WindowsPerf CLI for more flexibility. + +recommended_path: "/learning-paths/laptops-and-desktops/windowsperf_sampling_cpython" + +further_reading: + - resource: + title: Announcing WindowsPerf Open-source performance analysis tool for Windows on Arm + link: https://community.arm.com/arm-community-blogs/b/infrastructure-solutions-blog/posts/announcing-windowsperf + type: blog + - resource: + title: WindowsPerf Release 3.7.2 + link: https://www.linaro.org/blog/expanding-profiling-capabilities-with-windowsperf-372-release/ + type: blog + - resource: + title: WindowsPerf Visual Studio Extension v2.1.0 + link: https://www.linaro.org/blog/launching--windowsperf-visual-studio-extension-v210/ + type: blog + - resource: + title: Windows on Arm overview + link: https://learn.microsoft.com/en-us/windows/arm/overview + type: website + - resource: + title: Linaro Windows on Arm project + link: https://www.linaro.org/windows-on-arm/ + type: website + - resource: + title: WindowsPerf Visual Studio extension releases + link: https://github.com/arm-developer-tools/windowsperf-vs-extension/releases + type: website + - resource: + title: WindowsPerf releases + link: https://github.com/arm-developer-tools/windowsperf/releases + type: website + +# ================================================================================ +# FIXED, DO NOT MODIFY +# ================================================================================ +weight: 21 # set to always be larger than the content in this path, and one more than 'review' +title: "Next Steps" # Always the same +layout: "learningpathall" # All files under learning paths have this same wrapper +--- \ No newline at end of file diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/telemetry-preview.png b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/telemetry-preview.png new file mode 100644 index 000000000..c2b1c4edc Binary files /dev/null and b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/telemetry-preview.png differ diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/telemetry-table.png b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/telemetry-table.png new file mode 100644 index 000000000..eb85d4127 Binary files /dev/null and b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/telemetry-table.png differ diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/timeline-by-core.png b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/timeline-by-core.png new file mode 100644 index 000000000..b35f6df64 Binary files /dev/null and b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/timeline-by-core.png differ diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/timeline-by-event.png b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/timeline-by-event.png new file mode 100644 index 000000000..a3c4b0b3f Binary files /dev/null and b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/timeline-by-event.png differ diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/timeline-events-by-key.png b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/timeline-events-by-key.png new file mode 100644 index 000000000..2e28ba0b0 Binary files /dev/null and b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/timeline-events-by-key.png differ diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/wpa-first-screen.png b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/wpa-first-screen.png new file mode 100644 index 000000000..8a990d14f Binary files /dev/null and b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/wpa-first-screen.png differ diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/wpa-open-file.png b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/wpa-open-file.png new file mode 100644 index 000000000..8d5e01f41 Binary files /dev/null and b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/figures/wpa-open-file.png differ diff --git a/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/windowsperf_wpa_plugin.md b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/windowsperf_wpa_plugin.md new file mode 100644 index 000000000..20ac18eff --- /dev/null +++ b/content/learning-paths/laptops-and-desktops/windowsperf_wpa_plugin/windowsperf_wpa_plugin.md @@ -0,0 +1,93 @@ +--- +layout: learningpathall +title: WindowsPerf WPA Plugin +weight: 2 +--- + +# Overview + +WindpwsPerf WPA plugin is a plugin built for WPA that parses JSON output of `wperf` command line tool to visualize counting and telemetry events as timeline graphs. + +[**WindowsPerf**](https://github.com/arm-developer-tools/windowsperf) is a lightweight performance profiling tool inspired by Linux perf, specifically tailored for Windows on Arm. +It leverages the ARM64 PMU (Performance Monitor Unit) and its hardware counters to offer precise profiling capabilities. +The [WindowsPerf WPA plugin](https://github.com/arm-developer-tools/windowsperf-wpa-plugin) bridges the gap between the detailed output of **WindowsPerf** and the powerful capabilities of [Windows Performance Analyzer](https://learn.microsoft.com/en-us/windows-hardware/test/wpt/windows-performance-analyzer). + +## WindowsPerf WPA Plugin releases + +You can find all binary releases of `WindowsPerf WPA Plugin` [here](https://github.com/arm-developer-tools/windowsperf-wpa-plugin/releases). + +# Installation + +For installation instructions see the [install guide](/install-guides/windows-perf-wpa-plugin). + +## Using WindowsPerf WPA Plugin + +In order to use the `WindowsPerf WPA Plugin`, we first need to get a `.json` output from a WindowsPerf `wperf stat` command running on a Windows on Arm machine. +{{% notice Note%}} +In order to get a `.json` output from WindowsPerf, we need to use the `--output` command followed by the filename. +{{% /notice %}} + +Example: + +```command +wperf stat -e ld_spec --output example.json +``` + +Upon opening Windows Performance Analyzer, we are greeted with the following window: +![wpa-first-screen](figures/wpa-first-screen.png) + +As we can see, the `WindowsPerf WPA Plugin` is installed correctly and it appears under the Installed Plugins section. We can then click on "Open file..." from the start menu on the left side and we're prompted to choose a `.json` file. + +![wpa-open-file](figures/wpa-open-file.png) + +By clicking "Open", the output file is then validated to check its format and compatibility with the plugin, and finally the main WPA window opens up. + + +### Timeline + +The WindowsPerf timeline feature (command line option -t) enable continuous counting of Performance Monitoring Unit (PMU) events. +Users can specify sleep intervals (with -i) between counts and set the number of repetitions (with -n), allowing for detailed and flexible data collection. +Users can take advantage of the `WindowsPerf WPA Plugin` to visualize these complex measurements. +This plugin allows for detailed graphical representation of the PMU event data in WPA. + +For this example we will be running the following command: + +```command +wperf stat -m dcache -c 0,1,2,3,4,5,6,7 -t -i 0 -n 50 --json +``` + +Importing the generated output in WPA will show us the following graph: +![timeline-by-core](figures/timeline-by-core.png) + +We can change the default grouping from `Group by core` to `Group by event` to see the following graph instead: +![timeline-by-event](figures/timeline-by-event.png) + +The WindowsPerf WPA Plugin also generates a graph per event note in order to provide a more in-depth grouping of events. To see all the generated graphs we can expand the `Counting timeline` section in the graph explorer section of WPA. + +For this example, the following command was used instead: + +```command +wperf stat -t -i 0 -m imix,l1d_cache_miss_ratio,l1d_cache_mpki,l1d_tlb_miss_ratio,l1d_tlb_mpki -e inst_spec,vfp_spec,ld_spec,st_spec -c 1 --json +``` + +![timeline-events-by-key](figures/timeline-events-by-key.png) + +We can double click on any graph to expand it under the Analysis tab for further data visualization. + +### Telemetry + +The `WindowsPerf WPA Plugin` also allows the visualization of [Arm telemetry metrics](https://developer.arm.com/documentation/109542/0100/About-Arm-CPU-Telemetry-Solution) counted similarly to counting events. + +For this example, the following command was used: + +```command +wperf stat -t -i 0 -m imix,l1d_cache_miss_ratio,l1d_cache_mpki,l1d_tlb_miss_ratio,l1d_tlb_mpki -e inst_spec,vfp_spec,ld_spec,st_spec -c 1 --json +``` + +Similarlry to the graphs generated per event note for timeline events, we can also see the generated telemetry timeline graphs under the grapher explorer level in WPA. These graphs are generated dynamically so only the relevant metrics for the given `.json` output file are visible. + +![telemetry-preview](figures/telemetry-preview.png) + +Once expanded, a more in-depth view is visible under the Analysis tab of WPA. + +![telemetry-table](figures/telemetry-table.png) \ No newline at end of file