huchao
huchao
I analyze the hprof file byte by byte and print it, I can see the structure and content of each object, for example:  I thought each object was next...
My hprof dump file is just an Android 11 HelloWorld Application dump, no other extra code. As attached. [my.zip](https://github.com/square/leakcanary/files/9070164/my.zip)
> Window.OnFrameMetricsAvailableListener在trace canary中被封装成FrameTracer了,可以监控掉帧等内容,但我这边主要觉得EvilMethod监控比较有用,在分析日志时发现inputCost, animationCost, traversalCost对应不上,于是最终系统源码发现了问题所在。