From patchwork Thu May 15 15:29:53 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ian Campbell X-Patchwork-Id: 30267 Return-Path: X-Original-To: linaro@patches.linaro.org Delivered-To: linaro@patches.linaro.org Received: from mail-oa0-f70.google.com (mail-oa0-f70.google.com [209.85.219.70]) by ip-10-151-82-157.ec2.internal (Postfix) with ESMTPS id 7B647202E6 for ; Thu, 15 May 2014 15:31:57 +0000 (UTC) Received: by mail-oa0-f70.google.com with SMTP id i4sf6094411oah.1 for ; Thu, 15 May 2014 08:31:57 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:delivered-to:from:to:date:message-id :mime-version:cc:subject:precedence:list-id:list-unsubscribe :list-post:list-help:list-subscribe:sender:errors-to :x-original-sender:x-original-authentication-results:mailing-list :list-archive:content-type:content-transfer-encoding; bh=g+QE3tzWN9crItM+wAOdNKE+8S/+dULDk+sJWThf+Nw=; b=FwqkF0WfJkYBArDgi2OOc1lyO1pweIPgGOHYkqod+Cr4ph3QvizGc6w8dWtNfH6v8l ZvM2pM7xgADDoC0ENgwTxyU8PkHmVlw/EV8FTJYsNZpfZUzx9fyhZUSWSARmLt55Z1hd s5Hpc9/HaUTIKr/AymIkNH0Lf9nwHASi4Pnuy+MY8kkYoCTn+4UZR5PYjjvv5aPoq2lQ 7nHltSwvqUkG4P8GqfDo/BSOYIIKVFEVzR10xf+eDIoV7XLBH6RITE8I6ph6ZGbyLwwp yzmFck71dFNP9hmH3owVXcdNtGI2veGdImyzGGfg1M8AbHewRlirI+Qpj+Ud3UsVqb/T WGtg== X-Gm-Message-State: ALoCoQkxoXpzso4CIZo343V23MxGIUovl3SZoBqaySNThCfU0pxpBZPKfM0e1xlRJkTXF4pF5L2S X-Received: by 10.182.252.166 with SMTP id zt6mr5179840obc.17.1400167917005; Thu, 15 May 2014 08:31:57 -0700 (PDT) X-BeenThere: patchwork-forward@linaro.org Received: by 10.140.90.51 with SMTP id w48ls294370qgd.6.gmail; Thu, 15 May 2014 08:31:56 -0700 (PDT) X-Received: by 10.221.66.131 with SMTP id xq3mr800289vcb.43.1400167916814; Thu, 15 May 2014 08:31:56 -0700 (PDT) Received: from mail-ve0-f170.google.com (mail-ve0-f170.google.com [209.85.128.170]) by mx.google.com with ESMTPS id dz10si998852vcb.87.2014.05.15.08.31.56 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 15 May 2014 08:31:56 -0700 (PDT) Received-SPF: pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.128.170 as permitted sender) client-ip=209.85.128.170; Received: by mail-ve0-f170.google.com with SMTP id db11so1546728veb.1 for ; Thu, 15 May 2014 08:31:56 -0700 (PDT) X-Received: by 10.52.181.132 with SMTP id dw4mr178534vdc.86.1400167916700; Thu, 15 May 2014 08:31:56 -0700 (PDT) X-Forwarded-To: patchwork-forward@linaro.org X-Forwarded-For: patch@linaro.org patchwork-forward@linaro.org Delivered-To: patch@linaro.org Received: by 10.220.221.72 with SMTP id ib8csp332016vcb; Thu, 15 May 2014 08:31:56 -0700 (PDT) X-Received: by 10.52.145.211 with SMTP id sw19mr654540vdb.75.1400167916025; Thu, 15 May 2014 08:31:56 -0700 (PDT) Received: from lists.xen.org (lists.xen.org. [50.57.142.19]) by mx.google.com with ESMTPS id tx4si1002310vdc.4.2014.05.15.08.31.55 for (version=TLSv1 cipher=RC4-SHA bits=128/128); Thu, 15 May 2014 08:31:56 -0700 (PDT) Received-SPF: none (google.com: xen-devel-bounces@lists.xen.org does not designate permitted sender hosts) client-ip=50.57.142.19; Received: from localhost ([127.0.0.1] helo=lists.xen.org) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1Wkxbd-0001RH-Ft; Thu, 15 May 2014 15:30:01 +0000 Received: from mail6.bemta4.messagelabs.com ([85.158.143.247]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1Wkxbb-0001Qs-3r for xen-devel@lists.xen.org; Thu, 15 May 2014 15:29:59 +0000 Received: from [85.158.143.35:58580] by server-3.bemta-4.messagelabs.com id 13/57-13602-67DD4735; Thu, 15 May 2014 15:29:58 +0000 X-Env-Sender: Ian.Campbell@citrix.com X-Msg-Ref: server-7.tower-21.messagelabs.com!1400167796!5192690!1 X-Originating-IP: [66.165.176.63] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n X-StarScan-Received: X-StarScan-Version: 6.11.3; banners=-,-,- X-VirusChecked: Checked Received: (qmail 18548 invoked from network); 15 May 2014 15:29:57 -0000 Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63) by server-7.tower-21.messagelabs.com with RC4-SHA encrypted SMTP; 15 May 2014 15:29:57 -0000 X-IronPort-AV: E=Sophos; i="4.97,1059,1389744000"; d="scan'208"; a="130743190" Received: from accessns.citrite.net (HELO FTLPEX01CL02.citrite.net) ([10.9.154.239]) by FTLPIPO02.CITRIX.COM with ESMTP; 15 May 2014 15:29:55 +0000 Received: from ukmail1.uk.xensource.com (10.80.16.128) by smtprelay.citrix.com (10.13.107.79) with Microsoft SMTP Server id 14.3.181.6; Thu, 15 May 2014 11:29:55 -0400 Received: from drall.uk.xensource.com ([10.80.16.71]) by ukmail1.uk.xensource.com with smtp (Exim 4.69) (envelope-from ) id 1WkxbV-0003On-Ub; Thu, 15 May 2014 16:29:54 +0100 Received: by drall.uk.xensource.com (sSMTP sendmail emulation); Thu, 15 May 2014 16:29:53 +0100 From: Ian Campbell To: Date: Thu, 15 May 2014 16:29:53 +0100 Message-ID: <1400167793-25881-1-git-send-email-ian.campbell@citrix.com> X-Mailer: git-send-email 1.7.10.4 MIME-Version: 1.0 X-DLP: MIA1 Cc: julien.grall@linaro.org, tim@xen.org, Ian Campbell , stefano.stabellini@eu.citrix.com Subject: [Xen-devel] [PATCH] xen: arm: enable perf counters X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.13 Precedence: list List-Id: List-Unsubscribe: , List-Post: , List-Help: , List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org X-Removed-Original-Auth: Dkim didn't pass. X-Original-Sender: ian.campbell@citrix.com X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.128.170 as permitted sender) smtp.mail=patch+caf_=patchwork-forward=linaro.org@linaro.org Mailing-list: list patchwork-forward@linaro.org; contact patchwork-forward+owners@linaro.org X-Google-Group-Id: 836684582541 List-Archive: As well as the existing common perf counters add a bunch of ARM specifics, including the various trap types, vuart/vgic/vtimer accesses and different types of interrupt. Adjust the common code so that the columns line up again, not sure when/where this went wrong. Signed-off-by: Ian Campbell --- This is mostly the set of stuff I happened to be interested in, it can be made more fine grained as the need arises. --- xen/arch/arm/gic.c | 4 +++ xen/arch/arm/irq.c | 8 +++++- xen/arch/arm/time.c | 3 ++ xen/arch/arm/traps.c | 30 ++++++++++++++++++- xen/arch/arm/vgic.c | 11 +++++++ xen/arch/arm/vtimer.c | 24 ++++++++++++++++ xen/arch/arm/vuart.c | 5 ++++ xen/common/perfc.c | 4 +-- xen/include/asm-arm/config.h | 2 ++ xen/include/asm-arm/perfc.h | 12 ++++++++ xen/include/asm-arm/perfc_defn.h | 59 ++++++++++++++++++++++++++++++++++++++ 11 files changed, 158 insertions(+), 4 deletions(-) create mode 100644 xen/include/asm-arm/perfc.h create mode 100644 xen/include/asm-arm/perfc_defn.h diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c index 577d85b..f9f598b 100644 --- a/xen/arch/arm/gic.c +++ b/xen/arch/arm/gic.c @@ -679,6 +679,8 @@ void gic_inject(void) static void do_sgi(struct cpu_user_regs *regs, int othercpu, enum gic_sgi sgi) { + perfc_incr(ipis); + /* Lower the priority */ GICC[GICC_EOIR] = sgi; @@ -792,6 +794,8 @@ static void maintenance_interrupt(int irq, void *dev_id, struct cpu_user_regs *r struct vcpu *v = current; uint64_t eisr = GICH[GICH_EISR0] | (((uint64_t) GICH[GICH_EISR1]) << 32); + perfc_incr(maintenance_irqs); + while ((i = find_next_bit((const long unsigned int *) &eisr, 64, i)) < 64) { struct pending_irq *p, *p2; diff --git a/xen/arch/arm/irq.c b/xen/arch/arm/irq.c index 44696e7..704a095 100644 --- a/xen/arch/arm/irq.c +++ b/xen/arch/arm/irq.c @@ -150,7 +150,12 @@ void do_IRQ(struct cpu_user_regs *regs, unsigned int irq, int is_fiq) struct irq_desc *desc = irq_to_desc(irq); struct irqaction *action = desc->action; - /* TODO: perfc_incr(irqs); */ + perfc_incr(irqs); + + if (irq < 32) + perfc_incr(ppis); + else + perfc_incr(spis); /* TODO: this_cpu(irq_count)++; */ @@ -170,6 +175,7 @@ void do_IRQ(struct cpu_user_regs *regs, unsigned int irq, int is_fiq) { struct domain *d = irq_get_domain(desc); + perfc_incr(guest_irqs); desc->handler->end(desc); desc->status |= IRQ_INPROGRESS; diff --git a/xen/arch/arm/time.c b/xen/arch/arm/time.c index d04c97a..64106af 100644 --- a/xen/arch/arm/time.c +++ b/xen/arch/arm/time.c @@ -195,6 +195,7 @@ static void timer_interrupt(int irq, void *dev_id, struct cpu_user_regs *regs) if ( irq == (timer_irq[TIMER_HYP_PPI].irq) && READ_SYSREG32(CNTHP_CTL_EL2) & CNTx_CTL_PENDING ) { + perfc_incr(hyp_timer_irqs); /* Signal the generic timer code to do its work */ raise_softirq(TIMER_SOFTIRQ); /* Disable the timer to avoid more interrupts */ @@ -204,6 +205,7 @@ static void timer_interrupt(int irq, void *dev_id, struct cpu_user_regs *regs) if ( irq == (timer_irq[TIMER_PHYS_NONSECURE_PPI].irq) && READ_SYSREG32(CNTP_CTL_EL0) & CNTx_CTL_PENDING ) { + perfc_incr(phys_timer_irqs); /* Signal the generic timer code to do its work */ raise_softirq(TIMER_SOFTIRQ); /* Disable the timer to avoid more interrupts */ @@ -213,6 +215,7 @@ static void timer_interrupt(int irq, void *dev_id, struct cpu_user_regs *regs) static void vtimer_interrupt(int irq, void *dev_id, struct cpu_user_regs *regs) { + perfc_incr(virt_timer_irqs); current->arch.virt_timer.ctl = READ_SYSREG32(CNTV_CTL_EL0); WRITE_SYSREG32(current->arch.virt_timer.ctl | CNTx_CTL_MASK, CNTV_CTL_EL0); vgic_vcpu_inject_irq(current, current->arch.virt_timer.irq, 1); diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c index 03a3da6..232e9d9 100644 --- a/xen/arch/arm/traps.c +++ b/xen/arch/arm/traps.c @@ -30,6 +30,7 @@ #include #include #include +#include #include #include #include @@ -1106,6 +1107,8 @@ static void do_trap_psci(struct cpu_user_regs *regs) return; } + perfc_incra(pscsicalls, PSCI_OP_REG(regs)); + PSCI_RESULT_REG(regs) = psci_call(PSCI_ARGS(regs)); } @@ -1135,15 +1138,19 @@ static void do_trap_hypercall(struct cpu_user_regs *regs, register_t *nr, register_t orig_pc = regs->pc; #endif + BUILD_BUG_ON(NR_hypercalls < ARRAY_SIZE(arm_hypercall_table) ); + if ( iss != XEN_HYPERCALL_TAG ) domain_crash_synchronous(); if ( *nr >= ARRAY_SIZE(arm_hypercall_table) ) { + perfc_incr(invalid_hypercalls); HYPERCALL_RESULT_REG(regs) = -ENOSYS; return; } + perfc_incra(hypercalls, *nr); call = arm_hypercall_table[*nr].fn; if ( call == NULL ) { @@ -1283,8 +1290,10 @@ static int check_conditional_instr(struct cpu_user_regs *regs, union hsr hsr) cpsr_cond = cpsr >> 28; if ( !((cc_map[cond] >> cpsr_cond) & 1) ) + { + perfc_incr(trap_uncond); return 0; - + } return 1; } @@ -1664,6 +1673,7 @@ asmlinkage void do_trap_hypervisor(struct cpu_user_regs *regs) switch (hsr.ec) { case HSR_EC_WFI_WFE: + perfc_incr(trap_wfi_wfe); if ( !check_conditional_instr(regs, hsr) ) { advance_pc(regs, hsr); @@ -1684,38 +1694,51 @@ asmlinkage void do_trap_hypervisor(struct cpu_user_regs *regs) case HSR_EC_CP15_32: if ( !is_32bit_domain(current->domain) ) goto bad_trap; + perfc_incr(trap_cp15_32); do_cp15_32(regs, hsr); break; case HSR_EC_CP15_64: if ( !is_32bit_domain(current->domain) ) goto bad_trap; + perfc_incr(trap_cp15_32); do_cp15_64(regs, hsr); break; case HSR_EC_CP14_32: + if ( !is_32bit_domain(current->domain) ) + goto bad_trap; + perfc_incr(trap_cp14_32); + do_cp14(regs, hsr); + break; case HSR_EC_CP14_DBG: if ( !is_32bit_domain(current->domain) ) goto bad_trap; + perfc_incr(trap_cp14_dbg); do_cp14(regs, hsr); break; case HSR_EC_CP: if ( !is_32bit_domain(current->domain) ) goto bad_trap; + perfc_incr(trap_cp); do_cp(regs, hsr); break; case HSR_EC_SMC32: + perfc_incr(trap_smc32); inject_undef32_exception(regs); break; case HSR_EC_HVC32: + perfc_incr(trap_hvc32); #ifndef NDEBUG if ( (hsr.iss & 0xff00) == 0xff00 ) return do_debug_trap(regs, hsr.iss & 0x00ff); #endif if ( hsr.iss == 0 ) return do_trap_psci(regs); + do_trap_hypercall(regs, (register_t *)®s->r12, hsr.iss); break; #ifdef CONFIG_ARM_64 case HSR_EC_HVC64: + perfc_incr(trap_hvc64); #ifndef NDEBUG if ( (hsr.iss & 0xff00) == 0xff00 ) return do_debug_trap(regs, hsr.iss & 0x00ff); @@ -1725,23 +1748,28 @@ asmlinkage void do_trap_hypervisor(struct cpu_user_regs *regs) do_trap_hypercall(regs, ®s->x16, hsr.iss); break; case HSR_EC_SMC64: + perfc_incr(trap_smc64); inject_undef64_exception(regs, hsr.len); break; case HSR_EC_SYSREG: if ( is_32bit_domain(current->domain) ) goto bad_trap; + perfc_incr(trap_sysreg); do_sysreg(regs, hsr); break; #endif case HSR_EC_INSTR_ABORT_LOWER_EL: + perfc_incr(trap_iabt); do_trap_instr_abort_guest(regs, hsr); break; case HSR_EC_DATA_ABORT_LOWER_EL: + perfc_incr(trap_dabt); do_trap_data_abort_guest(regs, hsr); break; default: bad_trap: + perfc_incr(trap_bad); printk("Hypervisor Trap. HSR=0x%x EC=0x%x IL=%x Syndrome=0x%"PRIx32"\n", hsr.bits, hsr.ec, hsr.len, hsr.iss); do_unexpected_trap("Hypervisor", regs); diff --git a/xen/arch/arm/vgic.c b/xen/arch/arm/vgic.c index 4cf6470..cf990c3 100644 --- a/xen/arch/arm/vgic.c +++ b/xen/arch/arm/vgic.c @@ -24,6 +24,7 @@ #include #include #include +#include #include @@ -181,6 +182,8 @@ static int vgic_distr_mmio_read(struct vcpu *v, mmio_info_t *info) int offset = (int)(info->gpa - v->domain->arch.vgic.dbase); int gicd_reg = REG(offset); + perfc_incr(vgic_reads); + switch ( gicd_reg ) { case GICD_CTLR: @@ -450,9 +453,11 @@ static int vgic_to_sgi(struct vcpu *v, register_t sgir) switch ( filter ) { case GICD_SGI_TARGET_LIST: + perfc_incr(vgic_sgi_list); vcpu_mask = (sgir & GICD_SGI_TARGET_MASK) >> GICD_SGI_TARGET_SHIFT; break; case GICD_SGI_TARGET_OTHERS: + perfc_incr(vgic_sgi_others); for ( i = 0; i < d->max_vcpus; i++ ) { if ( i != current->vcpu_id && is_vcpu_running(d, i) ) @@ -460,6 +465,7 @@ static int vgic_to_sgi(struct vcpu *v, register_t sgir) } break; case GICD_SGI_TARGET_SELF: + perfc_incr(vgic_sgi_self); set_bit(current->vcpu_id, &vcpu_mask); break; default: @@ -491,6 +497,8 @@ static int vgic_distr_mmio_write(struct vcpu *v, mmio_info_t *info) int gicd_reg = REG(offset); uint32_t tr; + perfc_incr(vgic_writes); + switch ( gicd_reg ) { case GICD_CTLR: @@ -756,7 +764,10 @@ out: running = v->is_running; vcpu_unblock(v); if ( running && v != current ) + { + perfc_incr(vgic_cross_cpu_intr_inject); smp_send_event_check_mask(cpumask_of(v->processor)); + } } /* diff --git a/xen/arch/arm/vtimer.c b/xen/arch/arm/vtimer.c index b93153e..ebbb269 100644 --- a/xen/arch/arm/vtimer.c +++ b/xen/arch/arm/vtimer.c @@ -21,6 +21,7 @@ #include #include #include +#include #include #include #include @@ -34,7 +35,13 @@ static void phys_timer_expired(void *data) struct vtimer *t = data; t->ctl |= CNTx_CTL_PENDING; if ( !(t->ctl & CNTx_CTL_MASK) ) + { + perfc_incr(vtimer_phys_inject); vgic_vcpu_inject_irq(t->v, t->irq, 1); + } + else + perfc_incr(vtimer_phys_ignore); + } static void virt_timer_expired(void *data) @@ -42,6 +49,8 @@ static void virt_timer_expired(void *data) struct vtimer *t = data; t->ctl |= CNTx_CTL_MASK; vgic_vcpu_inject_irq(t->v, t->irq, 1); + perfc_incr(vtimer_virt_inject); + } int domain_vtimer_init(struct domain *d) @@ -192,6 +201,11 @@ static int vtimer_emulate_cp32(struct cpu_user_regs *regs, union hsr hsr) struct hsr_cp32 cp32 = hsr.cp32; uint32_t *r = (uint32_t *)select_user_reg(regs, cp32.reg); + if ( cp32.read ) + perfc_incr(vtimer_cp32_reads); + else + perfc_incr(vtimer_cp32_writes); + switch ( hsr.bits & HSR_CP32_REGS_MASK ) { case HSR_CPREG32(CNTP_CTL): @@ -214,6 +228,11 @@ static int vtimer_emulate_cp64(struct cpu_user_regs *regs, union hsr hsr) uint32_t *r2 = (uint32_t *)select_user_reg(regs, cp64.reg2); uint64_t x; + if ( cp64.read ) + perfc_incr(vtimer_cp64_reads); + else + perfc_incr(vtimer_cp64_writes); + switch ( hsr.bits & HSR_CP64_REGS_MASK ) { case HSR_CPREG64(CNTPCT): @@ -239,6 +258,11 @@ static int vtimer_emulate_sysreg(struct cpu_user_regs *regs, union hsr hsr) register_t *x = select_user_reg(regs, sysreg.reg); uint32_t r = (uint32_t)*x; + if ( sysreg.read ) + perfc_incr(vtimer_sysreg_reads); + else + perfc_incr(vtimer_sysreg_writes); + switch ( hsr.bits & HSR_SYSREG_REGS_MASK ) { case HSR_SYSREG_CNTP_CTL_EL0: diff --git a/xen/arch/arm/vuart.c b/xen/arch/arm/vuart.c index c02a8a9..05a0d2a 100644 --- a/xen/arch/arm/vuart.c +++ b/xen/arch/arm/vuart.c @@ -38,6 +38,7 @@ #include #include #include +#include #include "vuart.h" #include "io.h" @@ -108,6 +109,8 @@ static int vuart_mmio_read(struct vcpu *v, mmio_info_t *info) register_t *r = select_user_reg(regs, dabt.reg); paddr_t offset = info->gpa - d->arch.vuart.info->base_addr; + perfc_incr(vuart_reads); + /* By default zeroed the register */ *r = 0; @@ -126,6 +129,8 @@ static int vuart_mmio_write(struct vcpu *v, mmio_info_t *info) register_t *r = select_user_reg(regs, dabt.reg); paddr_t offset = info->gpa - d->arch.vuart.info->base_addr; + perfc_incr(vuart_writes); + if ( offset == d->arch.vuart.info->data_off ) /* ignore any status bits */ vuart_print_char(v, *r & 0xFF); diff --git a/xen/common/perfc.c b/xen/common/perfc.c index 96a4245..9f078e1 100644 --- a/xen/common/perfc.c +++ b/xen/common/perfc.c @@ -57,7 +57,7 @@ void perfc_printall(unsigned char key) for_each_online_cpu ( cpu ) { if ( k > 0 && (k % 4) == 0 ) - printk("\n%46s", ""); + printk("\n%53s", ""); printk(" CPU%02u[%10"PRIperfc"u]", cpu, per_cpu(perfcounters, cpu)[j]); ++k; } @@ -103,7 +103,7 @@ void perfc_printall(unsigned char key) if ( perfc_info[i].type == TYPE_S_ARRAY ) sum = (perfc_t) sum; if ( k > 0 && (k % 4) == 0 ) - printk("\n%46s", ""); + printk("\n%53s", ""); printk(" CPU%02u[%10Lu]", cpu, sum); ++k; } diff --git a/xen/include/asm-arm/config.h b/xen/include/asm-arm/config.h index ef291ff..0de6f7e 100644 --- a/xen/include/asm-arm/config.h +++ b/xen/include/asm-arm/config.h @@ -178,6 +178,8 @@ #define PAGE_MASK (~(PAGE_SIZE-1)) #define PAGE_FLAG_MASK (~0) +#define NR_hypercalls 64 + #define STACK_ORDER 3 #define STACK_SIZE (PAGE_SIZE << STACK_ORDER) diff --git a/xen/include/asm-arm/perfc.h b/xen/include/asm-arm/perfc.h new file mode 100644 index 0000000..a1a591e --- /dev/null +++ b/xen/include/asm-arm/perfc.h @@ -0,0 +1,12 @@ +#ifndef __ASM_PERFC_H__ +#define __ASM_PERFC_H__ + +static inline void arch_perfc_reset(void) +{ +} + +static inline void arch_perfc_gather(void) +{ +} + +#endif diff --git a/xen/include/asm-arm/perfc_defn.h b/xen/include/asm-arm/perfc_defn.h new file mode 100644 index 0000000..77ae339 --- /dev/null +++ b/xen/include/asm-arm/perfc_defn.h @@ -0,0 +1,59 @@ +/* This file is legitimately included multiple times. */ +/*#ifndef __XEN_PERFC_DEFN_H__*/ +/*#define __XEN_PERFC_DEFN_H__*/ + +PERFCOUNTER(invalid_hypercalls, "invalid hypercalls") + +PERFCOUNTER(trap_wfi_wfe, "trap: wfi/wfe") +PERFCOUNTER(trap_cp15_32, "trap: cp15 32-bit access") +PERFCOUNTER(trap_cp15_64, "trap: cp15 64-bit access") +PERFCOUNTER(trap_cp14_32, "trap: cp14 32-bit access") +PERFCOUNTER(trap_cp14_dbg, "trap: cp14 dbg access") +PERFCOUNTER(trap_cp, "trap: cp access") +PERFCOUNTER(trap_smc32, "trap: 32-bit smc") +PERFCOUNTER(trap_hvc32, "trap: 32-bit hvc") +#ifdef CONFIG_ARM_64 +PERFCOUNTER(trap_smc64, "trap: 64-bit smc") +PERFCOUNTER(trap_hvc64, "trap: 64-bit hvc") +PERFCOUNTER(trap_sysreg, "trap: sysreg access") +#endif +PERFCOUNTER(trap_iabt, "trap: guest instr abort") +PERFCOUNTER(trap_dabt, "trap: guest data abort") +PERFCOUNTER(trap_uncond, "trap: condition failed") +PERFCOUNTER(trap_bad, "trap: unknown/bad") + +PERFCOUNTER_ARRAY(pscsicalls, "#PSCI calls", 4) + +PERFCOUNTER(vgic_reads, "vgic: reads") +PERFCOUNTER(vgic_writes, "vgic: writes") +PERFCOUNTER(vgic_sgi_list, "vgic: SGI send to list") +PERFCOUNTER(vgic_sgi_others, "vgic: SGI send to others") +PERFCOUNTER(vgic_sgi_self, "vgic: SGI send to self") +PERFCOUNTER(vgic_cross_cpu_intr_inject, "vgic: cross-CPU irq inject") + +PERFCOUNTER(vuart_reads, "vuart: reads") +PERFCOUNTER(vuart_writes, "vuart: writes") + +PERFCOUNTER(vtimer_cp32_reads, "vtimer: cp32 reads") +PERFCOUNTER(vtimer_cp32_writes, "vtimer: cp32 writes") + +PERFCOUNTER(vtimer_cp64_reads, "vtimer: cp64 reads") +PERFCOUNTER(vtimer_cp64_writes, "vtimer: cp64 writes") + +PERFCOUNTER(vtimer_sysreg_reads, "vtimer: sysreg reads") +PERFCOUNTER(vtimer_sysreg_writes, "vtimer: sysreg writes") + +PERFCOUNTER(vtimer_phys_inject, "vtimer: phys expired, injected") +PERFCOUNTER(vtimer_phys_ignore, "vtimer: phys expired, ignored") +PERFCOUNTER(vtimer_virt_inject, "vtimer: virt expired, injected") + +PERFCOUNTER(ppis, "#PPIs") +PERFCOUNTER(spis, "#SPIs") +PERFCOUNTER(guest_irqs, "#GUEST-IRQS") + +PERFCOUNTER(hyp_timer_irqs, "Hypervisor timer interrupts") +PERFCOUNTER(phys_timer_irqs, "Physical timer interrupts") +PERFCOUNTER(virt_timer_irqs, "Virtual timer interrupts") +PERFCOUNTER(maintenance_irqs, "Maintenance interrupts") + +/*#endif*/ /* __XEN_PERFC_DEFN_H__ */