/aosp12/system/extras/simpleperf/demo/ |
H A D | README.md | 58 $ adb install -r app/build/outputs/apk/app-profiling.apk 61 2. Record profiling data: 69 3. Show profiling data: 90 $ adb install -r app/build/outputs/apk/profiling/app-profiling.apk 93 2. Record profiling data: 101 3. Show profiling data: 122 $ adb install -r app/build/outputs/apk/profiling/app-profiling.apk 125 2. Record profiling data: 133 3. Show profiling data: 172 4. Collect profiling data. [all …]
|
/aosp12/system/extras/simpleperf/doc/ |
H A D | android_application_profiling.md | 1 # Android application profiling 8 2. Record profiling data. 9 3. Report profiling data. 14 - [Android application profiling](#android-application-profiling) 17 - [Record and report profiling data](#record-and-report-profiling-data) 25 - [Parse profiling data manually](#parse-profiling-data-manually) 123 It builds an app-profiling.apk for profiling. 134 $ adb install -r app/build/outputs/apk/profiling/app-profiling.apk 137 ## Record and report profiling data 306 recording, a profiling data file is generated. [all …]
|
H A D | README.md | 18 - [Android application profiling](#android-application-profiling) 19 - [Android platform profiling](#android-platform-profiling) 23 …- [Why we suggest profiling on Android >= N devices?](#why-we-suggest-profiling-on-android--n-devi… 37 the Android profiling environment: 54 c. Supports profiling shared libraries embedded in apk files. 64 Python scripts to parse profiling data. 95 ## Android application profiling 100 ## Android platform profiling 117 ### Why we suggest profiling on Android >= N devices? 120 profiling on real devices instead of emulators. [all …]
|
H A D | scripts_reference.md | 24 app_profiler.py is used to record profiling data for Android applications and native executables. 44 "dex2oat --dex-file=/data/local/tmp/app-profiling.apk --oat-file=/data/local/tmp/a.oat" 54 # Save profiling data in a custom file (like perf_custom.data) instead of perf.data. 83 before recording, and collects profiling data files after recording. 89 run_simpleperf_without_usb_connection.py records profiling data while the USB cable isn't 105 The binary_cache directory is a directory holding binaries needed by a profiling data file. The 111 build binary_cache for existing profiling data files using binary_cache_builder.py. It is useful 112 when you record profiling data using `simpleperf record` directly, to do system wide profiling or 147 report_html.py generates report.html based on the profiling data. Then the report.html can show 148 the profiling result without depending on other files. So it can be shown in local browsers or [all …]
|
H A D | executable_commands_reference.md | 23 - [Set the path to store profiling data](#set-the-path-to-store-profiling-data) 27 - [Set the path to read profiling data](#set-the-path-to-read-profiling-data) 48 1. Given user options, simpleperf enables profiling by making a system call to the kernel. 50 3. After profiling, simpleperf reads counters from the kernel, and reports a counter summary. 53 1. Given user options, simpleperf enables profiling by making a system call to the kernel. 73 The record command: profiles processes and stores profiling data in perf.data. 74 The report command: reports profiling data in perf.data. 421 ### Set the path to store profiling data 509 Below is an example comparing the profiling result with / without --trace-offcpu. 541 into sample entries, and where to find profiling data and binaries. [all …]
|
H A D | android_platform_profiling.md | 1 # Android platform profiling 4 - [Android platform profiling](#android-platform-profiling)
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | heapprofd.te | 1 # Android heap profiling daemon. go/heapprofd. 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 8 # own SELinux domain), which will exclusively handle profiling of its parent. 10 # On debug builds, this central daemon performs profiling for all target 32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid 40 # When handling profiling for all processes, heapprofd needs to read
|
H A D | simpleperf.te | 10 # When running in this domain, simpleperf is scoped to profiling an individual 11 # app. The necessary MAC permissions for profiling are more maintainable and 21 # Allow using perf_event_open syscall for profiling the target app.
|
H A D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 13 # Thread-specific profiling is still disallowed due to a PTRACE_MODE_ATTACH 47 # Never allow profiling highly privileged processes.
|
H A D | domain.te | 9 # whether to load the heap profiling library. This does not necessarily enable 10 # heap profiling, as initialization will fail if it does not have the 13 # Allow heap profiling on debug builds. 31 # As above, allow perf profiling most processes on debug builds. 32 # zygote is excluded as system-wide profiling could end up with it
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | heapprofd.te | 1 # Android heap profiling daemon. go/heapprofd. 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 8 # own SELinux domain), which will exclusively handle profiling of its parent. 10 # On debug builds, this central daemon performs profiling for all target 32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid 42 # When handling profiling for all processes, heapprofd needs to read
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | heapprofd.te | 1 # Android heap profiling daemon. go/heapprofd. 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 8 # own SELinux domain), which will exclusively handle profiling of its parent. 10 # On debug builds, this central daemon performs profiling for all target 32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid 40 # When handling profiling for all processes, heapprofd needs to read
|
H A D | simpleperf.te | 10 # When running in this domain, simpleperf is scoped to profiling an individual 11 # app. The necessary MAC permissions for profiling are more maintainable and 21 # Allow using perf_event_open syscall for profiling the target app.
|
H A D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 13 # Thread-specific profiling is still disallowed due to a PTRACE_MODE_ATTACH 61 # Never allow profiling highly privileged processes.
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | heapprofd.te | 1 # Android heap profiling daemon. go/heapprofd. 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 8 # own SELinux domain), which will exclusively handle profiling of its parent. 10 # On debug builds, this central daemon performs profiling for all target 32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid 40 # When handling profiling for all processes, heapprofd needs to read
|
H A D | simpleperf.te | 10 # When running in this domain, simpleperf is scoped to profiling an individual 11 # app. The necessary MAC permissions for profiling are more maintainable and 21 # Allow using perf_event_open syscall for profiling the target app.
|
H A D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 13 # Thread-specific profiling is still disallowed due to a PTRACE_MODE_ATTACH 61 # Never allow profiling highly privileged processes.
|
/aosp12/system/sepolicy/private/ |
H A D | heapprofd.te | 1 # Android heap profiling daemon. go/heapprofd. 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 8 # own SELinux domain), which will exclusively handle profiling of its parent. 10 # On debug builds, this central daemon performs profiling for all target 32 # profiling, only allowlisted domains will be allowed by SELinux. Avoid 40 # When handling profiling for all processes, heapprofd needs to read
|
H A D | simpleperf.te | 10 # When running in this domain, simpleperf is scoped to profiling an individual 11 # app. The necessary MAC permissions for profiling are more maintainable and 21 # Allow using perf_event_open syscall for profiling the target app.
|
H A D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 13 # Thread-specific profiling is still disallowed due to a PTRACE_MODE_ATTACH 61 # Never allow profiling highly privileged processes.
|
/aosp12/frameworks/base/apct-tests/perftests/inputmethod/ |
H A D | README.md | 20 --module-arg ImePerfTests:instrumentation-arg:profiling-iterations:=20 37 - profiling-iterations 38 * int: Run the extra iterations with enabling method profiling. 39 - profiling-sampling 40 * int: The interval (0=trace each method, default is 10) of sample profiling in microseconds.
|
/aosp12/frameworks/base/apct-tests/perftests/windowmanager/ |
H A D | README.md | 32 - profiling-iterations 33 * int: Run the extra iterations with enabling method profiling. 34 - profiling-sampling 35 * int: The interval (0=trace each method, default is 10) of sample profiling in microseconds.
|
/aosp12/system/extras/simpleperf/demo/SimpleperfExampleOfKotlin/app/ |
H A D | profiling.gradle | 7 profiling { 27 // Add lib/xxx/wrap.sh in the apk. This is to enable java profiling on Android O 30 profiling {
|
/aosp12/system/extras/simpleperf/demo/SimpleperfExamplePureJava/app/ |
H A D | profiling.gradle | 7 profiling { 27 // Add lib/xxx/wrap.sh in the apk. This is to enable java profiling on Android O 30 profiling {
|
/aosp12/system/extras/simpleperf/demo/SimpleperfExampleWithNative/app/ |
H A D | profiling.gradle | 7 profiling { 26 // Add lib/xxx/wrap.sh in the apk. This is to enable java profiling on Android O 29 profiling {
|