blob: a261d897f3689a3b9892dd424ff94171215723b4 [file] [log] [blame]
====================================
HEAP ANALYSIS RESULT
====================================
0 APPLICATION LEAKS
References underlined with "~~~" are likely causes.
Learn more at https://squ.re/leaks.
====================================
0 LIBRARY LEAKS
A Library Leak is a leak caused by a known bug in 3rd party code that you do not have control over.
See https://square.github.io/leakcanary/fundamentals-how-leakcanary-works/#4-categorizing-leaks
====================================
0 UNREACHABLE OBJECTS
An unreachable object is still in memory but LeakCanary could not find a strong reference path
from GC roots.
====================================
METADATA
Please include this in bug reports and Stack Overflow questions.
Build.VERSION.SDK_INT: 28
Build.MANUFACTURER: unknown
LeakCanary version: 2.11
App process name: android.com.java.profilertester
Class count: 12943
Instance count: 146881
Primitive array count: 115776
Object array count: 18082
Thread count: 18
Heap total bytes: 32981943
Bitmap count: 6
Bitmap total bytes: 108168
Large bitmap count: 0
Large bitmap total bytes: 0
Stats: LruCache[maxSize=3000,hits=30337,misses=73706,hitRate=29%] RandomAccess[bytes=3449937,reads=73706,travel=20699452094,range=20805336,size=42172386]
Analysis duration: 1435 ms
Heap dump file path: /Users/addivya/bin/leakcanary/2024-02-24_20-54-55_520-android.com.java.profilertester.hprof
Heap dump timestamp: 1708836902715
Heap dump duration: Unknown
====================================