Add debug system properties to control profiling limits.
When security.perf_harden is disabled through adb, use some debug system properties to set profiling limits in the kernel, including cpu percentage, memory, and max sample rate. Bug: 110706031 Test: boot hikey960 and manually set system properties to make Test: sure it works. Change-Id: I44c0adf3a000bb393905233f2a097c97b5fe91ec
This commit is contained in:
parent
4251739928
commit
4f0da7cb82
|
@ -718,6 +718,9 @@ on property:sys.sysctl.tcp_def_init_rwnd=*
|
|||
|
||||
on property:security.perf_harden=0
|
||||
write /proc/sys/kernel/perf_event_paranoid 1
|
||||
write /proc/sys/kernel/perf_event_max_sample_rate ${debug.perf_event_max_sample_rate:-100000}
|
||||
write /proc/sys/kernel/perf_cpu_time_max_percent ${debug.perf_cpu_time_max_percent:-25}
|
||||
write /proc/sys/kernel/perf_event_mlock_kb ${debug.perf_event_mlock_kb:-516}
|
||||
|
||||
on property:security.perf_harden=1
|
||||
write /proc/sys/kernel/perf_event_paranoid 3
|
||||
|
|
Loading…
Reference in New Issue