heapprofd - Android Heap Profiler

Googlers, for design doc see: http://go/heapprofd-design

heapprofd requires Android Q.

heapprofd is a tool that tracks native heap allocations & deallocations of an Android process within a given time period. The resulting profile can be used to attribute memory usage to particular function callstacks, supporting a mix of both native and java code. The tool should be useful to Android platform developers, and app developers investigating memory issues.

On debug Android builds, you can profile all apps and most system services. On “user” builds, you can only use it on apps with the debuggable or profileable manifest flag.

Quickstart

Use the tools/heap_profile script to heap profile a process. If you are having trouble make sure you are using the latest version.

See all the arguments using tools/heap_profile -h, or use the defaults and just profile a process (e.g. system_server):

$ tools/heap_profile --name system_server
Profiling active. Press Ctrl+C to terminate.
^CWrote profiles to /tmp/heap_profile-XSKcZ3i (symlink /tmp/heap_profile-latest)
These can be viewed using pprof. Googlers: head to pprof/ and upload them.

This will create a pprof-compatible heap dump when Ctrl+C is pressed.

Viewing the data

The resulting profile proto contains four views on the data

  • space: how many bytes were allocated but not freed at this callstack the moment the dump was created.
  • alloc_space: how many bytes were allocated (including ones freed at the moment of the dump) at this callstack
  • objects: how many allocations without matching frees were done at this callstack.
  • alloc_objects: how many allocations (including ones with matching frees) were done at this callstack.

Googlers: Head to http://pprof/ and upload the gzipped protos to get a visualization. Tip: you might want to put libart.so as a “Hide regex” when profiling apps.

Speedscope can also be used to visualize the heap dump, but will only show the space view. Tip: Click Left Heavy on the top left for a good visualisation.

Sampling interval

heapprofd samples heap allocations. Given a sampling interval of n bytes, one allocation is sampled, on average, every n bytes allocated. This allows to reduce the performance impact on the target process. The default sampling rate is 4096 bytes.

The easiest way to reason about this is to imagine the memory allocations as a steady stream of one byte allocations. From this stream, every n-th byte is selected as a sample, and the corresponding allocation gets attributed the complete n bytes. As an optimization, we sample allocations larger than the sampling interval with their true size.

To make this statistically more meaningful, Poisson sampling is employed. Instead of a static parameter of n bytes, the user can only choose the mean value around which the interval is distributed. This makes sure frequent small allocations get sampled as well as infrequent large ones.

Startup profiling

When a profile session names processes by name and a matching process is started, it gets profiled from the beginning. The resulting profile will contain all allocations done between the start of the process and the end of the profiling session.

On Android, Java apps are usually not started, but the zygote forks and then specializes into the desired app. If the app's name matches a name specified in the profiling session, profiling will be enabled as part of the zygote specialization. The resulting profile contains all allocations done between that point in zygote specialization and the end of the profiling session. Some allocations done early in the specialization process are not accounted for.

The Resulting ProfileProto will have from_startup set to true in the corresponding ProcessHeapSamples message. This does not get surfaced in the converted pprof compatible proto.

Runtime profiling

When a profile session is started, all matching processes (by name or PID) are enumerated and profiling is enabled. The resulting profile will contain all allocations done between the beginning and the end of the profiling session.

The Resulting ProfileProto will have from_startup set to false in the corresponding ProcessHeapSamples message. This does not get surfaced in the converted pprof compatible proto.

Concurrent profiling sessions

If multiple sessions name the same target process (either by name or PID), only the first relevant session will profile the process. The other sessions will report that the process had already been profiled when converting to the pprof compatible proto.

If you see this message but do not expect any other sessions, run

adb shell killall -KILL perfetto

to stop any concurrent sessions that may be running.

The Resulting ProfileProto will have rejected_concurrent set to true in otherwise empty corresponding ProcessHeapSamples message. This does not get surfaced in the converted pprof compatible proto.

Target processes

Depending on the build of Android that heapprofd is run on, some processes are not be eligible to be profiled.

On user builds, only Java applications with either the profileable or the debugable manifest flag set can be profiled. Profiling requests for other processes will result in an empty profile.

On userdebug builds, all processes except for a small blacklist of critical services can be profiled. This restriction can be lifted by disabling SELinux by running adb shell su root setenforce 0 or by passing --disable-selinux to the heap_profile script.

userdebug setenforce 0userdebuguser
critical native serviceynn
native serviceyyn
appyyn
profileable appyyy
debugable appyyy

Troubleshooting

Buffer overrun

If the rate of allocations is too high for heapprofd to keep up, the profiling session will end early due to a buffer overrun. If the buffer overrun is caused by a transient spike in allocations, increasing the shared memory buffer size (passing --shmem-size to heap_profile) can resolve the issue. Otherwise the sampling interval can be increased (at the expense of lower accuracy in the resulting profile) by passing --interval to heap_profile.

Profile is empty

Check whether your target process is eligible to be profiled by consulting Target processes above.

Known Issues

  • Does not work on x86 platforms (including the Android cuttlefish emulator).

Ways to count memory

When using heapprofd and interpreting results, it is important to know the precise meaning of the different memory metrics that can be obtained from the operating system.

heapprofd gives you the number of bytes the target program requested from the allocator. If you are profiling a Java app from startup, allocations that happen early in the application's initialization will not be visibile to heapprofd. Native services that do not fork from the Zygote are not affected by this.

malloc_info is a libc function that gives you information about the allocator. This can be triggered on userdebug builds by using am dumpheap -m <PID> /data/local/tmp/heap.txt. This will in general be more than the memory seen by heapprofd, depending on the allocator not all memory is immediately freed. In particular, jemalloc retains some freed memory in thread caches.

Heap RSS is the amount of memory requested from the operating system by the allocator. This is larger than the previous two numbers because memory can only be obtained in page size chunks, and fragmentation causes some of that memory to be wasted. This can be obtained by running adb shell dumpsys meminfo <PID> and looking at the “Private Dirty” column.

heapprofdmalloc_infoRSS
from native startupxxx
after zygote initxxx
before zygote initxx
thread cachesxx
fragmentationx

If you observe high RSS or malloc_info metrics but heapprofd does not match, there might be a problem with fragmentation or the allocator.

Manual instructions

It is not recommended to use these instructions unless you have advanced requirements or are developing heapprofd. Proceed with caution

Download trace_to_text

Download the latest trace_to_text for Linux or MacOS. This is needed to convert the Perfetto trace to a pprof-compatible file.

Compare the sha1sum of this file to the one contained in the file name.

Start profiling

To start profiling the process ${PID}, run the following sequence of commands. Adjust the INTERVAL to trade-off runtime impact for higher accuracy of the results. If INTERVAL=1, every allocation is sampled for maximum accuracy. Otherwise, a sample is taken every INTERVAL bytes on average.

INTERVAL=4096

echo '
buffers {
  size_kb: 100024
}

data_sources {
  config {
    name: "android.heapprofd"
    target_buffer: 0
    heapprofd_config {
      sampling_interval_bytes: '${INTERVAL}'
      pid: '${PID}'
    }
  }
}

duration_ms: 20000
' | adb shell perfetto --txt -c - -o /data/misc/perfetto-traces/profile

adb pull /data/misc/perfetto-traces/profile /tmp/profile

Convert to pprof compatible file

While we work on UI support, you can convert the trace into pprof compatible heap dumps.

Use the trace_to_text file downloaded above, with XXXXXXX replaced with the sha1sum of the file.

trace_to_text-linux-XXXXXXX profile /tmp/profile

This will create a directory in /tmp/ containing the heap dumps. Run

gzip /tmp/heap_profile-XXXXXX/*.pb

to get gzipped protos, which tools handling pprof profile protos expect.

Follow the instructions in Viewing the Data to visualise the results.