Hello Egor,
Thank you very much for your reply.
I noticed that while I am able to capture M events containing stack frames from our Android app on an arm64 Android 14 device, I cannot do the same on an x86 Android 10 emulator via chrome://tracing, which might be related to differences in the Android version
or the CPU architecture.
I am now able to parse the captured trace files using symbolize_trace, but I found that the data does not contain much information directly related to our app’s code logic.
Following your suggestion, I enabled additional trace categories, but after parsing the trace files, I still did not see many app-relevant details. Most of the Stack Frames(ƒ) events point to lower-level system calls or framework stacks.
Could you advise if there is a way to obtain more business-logic-related memory information? Would this require us to add custom trace_event definitions ourselves?
Additionally, I observed a discrepancy between two closely timed M events:
The first M event contains malloc data along with ƒ and Object Type (Ⓣ ) information, with a total across all processes of 62.9 MB.
The second M event, although it contains more categories, does not include detailed ƒ/Ⓣ events, but its malloc total is 328 MB.
I’m not quite sure what causes this difference. Could you provide some insight into this behavior?
Thank you for your guidance.
Regards,
Ke