Home
last modified time | relevance | path

Searched refs:profiling (Results 1 – 25 of 95) sorted by relevance

1234

/aosp12/system/extras/simpleperf/demo/
H A DREADME.md58 $ adb install -r app/build/outputs/apk/app-profiling.apk
61 2. Record profiling data:
69 3. Show profiling data:
90 $ adb install -r app/build/outputs/apk/profiling/app-profiling.apk
93 2. Record profiling data:
101 3. Show profiling data:
122 $ adb install -r app/build/outputs/apk/profiling/app-profiling.apk
125 2. Record profiling data:
133 3. Show profiling data:
172 4. Collect profiling data.
[all …]
/aosp12/system/extras/simpleperf/doc/
H A Dandroid_application_profiling.md1 # Android application profiling
8 2. Record profiling data.
9 3. Report profiling data.
14 - [Android application profiling](#android-application-profiling)
17 - [Record and report profiling data](#record-and-report-profiling-data)
25 - [Parse profiling data manually](#parse-profiling-data-manually)
123 It builds an app-profiling.apk for profiling.
134 $ adb install -r app/build/outputs/apk/profiling/app-profiling.apk
137 ## Record and report profiling data
306 recording, a profiling data file is generated.
[all …]
H A DREADME.md18 - [Android application profiling](#android-application-profiling)
19 - [Android platform profiling](#android-platform-profiling)
23 …- [Why we suggest profiling on Android >= N devices?](#why-we-suggest-profiling-on-android--n-devi…
37 the Android profiling environment:
54 c. Supports profiling shared libraries embedded in apk files.
64 Python scripts to parse profiling data.
95 ## Android application profiling
100 ## Android platform profiling
117 ### Why we suggest profiling on Android >= N devices?
120 profiling on real devices instead of emulators.
[all …]
H A Dscripts_reference.md24 app_profiler.py is used to record profiling data for Android applications and native executables.
44 "dex2oat --dex-file=/data/local/tmp/app-profiling.apk --oat-file=/data/local/tmp/a.oat"
54 # Save profiling data in a custom file (like perf_custom.data) instead of perf.data.
83 before recording, and collects profiling data files after recording.
89 run_simpleperf_without_usb_connection.py records profiling data while the USB cable isn't
105 The binary_cache directory is a directory holding binaries needed by a profiling data file. The
111 build binary_cache for existing profiling data files using binary_cache_builder.py. It is useful
112 when you record profiling data using `simpleperf record` directly, to do system wide profiling or
147 report_html.py generates report.html based on the profiling data. Then the report.html can show
148 the profiling result without depending on other files. So it can be shown in local browsers or
[all …]
H A Dexecutable_commands_reference.md23 - [Set the path to store profiling data](#set-the-path-to-store-profiling-data)
27 - [Set the path to read profiling data](#set-the-path-to-read-profiling-data)
48 1. Given user options, simpleperf enables profiling by making a system call to the kernel.
50 3. After profiling, simpleperf reads counters from the kernel, and reports a counter summary.
53 1. Given user options, simpleperf enables profiling by making a system call to the kernel.
73 The record command: profiles processes and stores profiling data in perf.data.
74 The report command: reports profiling data in perf.data.
421 ### Set the path to store profiling data
509 Below is an example comparing the profiling result with / without --trace-offcpu.
541 into sample entries, and where to find profiling data and binaries.
[all …]
H A Dandroid_platform_profiling.md1 # Android platform profiling
4 - [Android platform profiling](#android-platform-profiling)
/aosp12/system/sepolicy/prebuilts/api/30.0/private/
H A Dheapprofd.te1 # Android heap profiling daemon. go/heapprofd.
4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
8 # own SELinux domain), which will exclusively handle profiling of its parent.
10 # On debug builds, this central daemon performs profiling for all target
32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid
40 # When handling profiling for all processes, heapprofd needs to read
H A Dsimpleperf.te10 # When running in this domain, simpleperf is scoped to profiling an individual
11 # app. The necessary MAC permissions for profiling are more maintainable and
21 # Allow using perf_event_open syscall for profiling the target app.
H A Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
13 # Thread-specific profiling is still disallowed due to a PTRACE_MODE_ATTACH
47 # Never allow profiling highly privileged processes.
H A Ddomain.te9 # whether to load the heap profiling library. This does not necessarily enable
10 # heap profiling, as initialization will fail if it does not have the
13 # Allow heap profiling on debug builds.
31 # As above, allow perf profiling most processes on debug builds.
32 # zygote is excluded as system-wide profiling could end up with it
/aosp12/system/sepolicy/prebuilts/api/29.0/private/
H A Dheapprofd.te1 # Android heap profiling daemon. go/heapprofd.
4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
8 # own SELinux domain), which will exclusively handle profiling of its parent.
10 # On debug builds, this central daemon performs profiling for all target
32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid
42 # When handling profiling for all processes, heapprofd needs to read
/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Dheapprofd.te1 # Android heap profiling daemon. go/heapprofd.
4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
8 # own SELinux domain), which will exclusively handle profiling of its parent.
10 # On debug builds, this central daemon performs profiling for all target
32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid
40 # When handling profiling for all processes, heapprofd needs to read
H A Dsimpleperf.te10 # When running in this domain, simpleperf is scoped to profiling an individual
11 # app. The necessary MAC permissions for profiling are more maintainable and
21 # Allow using perf_event_open syscall for profiling the target app.
H A Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
13 # Thread-specific profiling is still disallowed due to a PTRACE_MODE_ATTACH
61 # Never allow profiling highly privileged processes.
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Dheapprofd.te1 # Android heap profiling daemon. go/heapprofd.
4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
8 # own SELinux domain), which will exclusively handle profiling of its parent.
10 # On debug builds, this central daemon performs profiling for all target
32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid
40 # When handling profiling for all processes, heapprofd needs to read
H A Dsimpleperf.te10 # When running in this domain, simpleperf is scoped to profiling an individual
11 # app. The necessary MAC permissions for profiling are more maintainable and
21 # Allow using perf_event_open syscall for profiling the target app.
H A Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
13 # Thread-specific profiling is still disallowed due to a PTRACE_MODE_ATTACH
61 # Never allow profiling highly privileged processes.
/aosp12/system/sepolicy/private/
H A Dheapprofd.te1 # Android heap profiling daemon. go/heapprofd.
4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
8 # own SELinux domain), which will exclusively handle profiling of its parent.
10 # On debug builds, this central daemon performs profiling for all target
32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid
40 # When handling profiling for all processes, heapprofd needs to read
H A Dsimpleperf.te10 # When running in this domain, simpleperf is scoped to profiling an individual
11 # app. The necessary MAC permissions for profiling are more maintainable and
21 # Allow using perf_event_open syscall for profiling the target app.
H A Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
13 # Thread-specific profiling is still disallowed due to a PTRACE_MODE_ATTACH
61 # Never allow profiling highly privileged processes.
/aosp12/frameworks/base/apct-tests/perftests/inputmethod/
H A DREADME.md20 --module-arg ImePerfTests:instrumentation-arg:profiling-iterations:=20
37 - profiling-iterations
38 * int: Run the extra iterations with enabling method profiling.
39 - profiling-sampling
40 * int: The interval (0=trace each method, default is 10) of sample profiling in microseconds.
/aosp12/frameworks/base/apct-tests/perftests/windowmanager/
H A DREADME.md32 - profiling-iterations
33 * int: Run the extra iterations with enabling method profiling.
34 - profiling-sampling
35 * int: The interval (0=trace each method, default is 10) of sample profiling in microseconds.
/aosp12/system/extras/simpleperf/demo/SimpleperfExampleOfKotlin/app/
H A Dprofiling.gradle7 profiling {
27 // Add lib/xxx/wrap.sh in the apk. This is to enable java profiling on Android O
30 profiling {
/aosp12/system/extras/simpleperf/demo/SimpleperfExamplePureJava/app/
H A Dprofiling.gradle7 profiling {
27 // Add lib/xxx/wrap.sh in the apk. This is to enable java profiling on Android O
30 profiling {
/aosp12/system/extras/simpleperf/demo/SimpleperfExampleWithNative/app/
H A Dprofiling.gradle7 profiling {
26 // Add lib/xxx/wrap.sh in the apk. This is to enable java profiling on Android O
29 profiling {

1234