Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 4f0da7cb authored by Yabin Cui's avatar Yabin Cui
Browse files

Add debug system properties to control profiling limits.

When security.perf_harden is disabled through adb, use some debug
system properties to set profiling limits in the kernel, including
cpu percentage, memory, and max sample rate.

Bug: 110706031
Test: boot hikey960 and manually set system properties to make
Test: sure it works.

Change-Id: I44c0adf3a000bb393905233f2a097c97b5fe91ec
parent 42517399
Loading
Loading
Loading
Loading
+3 −0
Original line number Original line Diff line number Diff line
@@ -718,6 +718,9 @@ on property:sys.sysctl.tcp_def_init_rwnd=*


on property:security.perf_harden=0
on property:security.perf_harden=0
    write /proc/sys/kernel/perf_event_paranoid 1
    write /proc/sys/kernel/perf_event_paranoid 1
    write /proc/sys/kernel/perf_event_max_sample_rate ${debug.perf_event_max_sample_rate:-100000}
    write /proc/sys/kernel/perf_cpu_time_max_percent ${debug.perf_cpu_time_max_percent:-25}
    write /proc/sys/kernel/perf_event_mlock_kb ${debug.perf_event_mlock_kb:-516}


on property:security.perf_harden=1
on property:security.perf_harden=1
    write /proc/sys/kernel/perf_event_paranoid 3
    write /proc/sys/kernel/perf_event_paranoid 3