packet { process_tree { processes { pid: 1 ppid: 0 cmdline: "init" uid: 0 } processes { pid: 2 ppid: 1 cmdline: "system_server" uid: 1000 } } } packet { trusted_packet_sequence_id: 999 timestamp: 10 heap_graph { pid: 2 roots { root_type: ROOT_JAVA_FRAME object_ids: 0x01 } objects { id: 0x01 type_id: 1 self_size: 64 reference_field_id: 1 reference_object_id: 0x02 } objects { id: 0x02 type_id: 2 self_size: 32 } objects { id: 0x03 type_id: 2 self_size: 128 } objects { id: 0x04 type_id: 3 self_size: 256 reference_field_id: 2 reference_object_id: 0x01 } continued: true index: 1 } } packet { trusted_packet_sequence_id: 1 timestamp: 10 heap_graph { pid: 3 roots { root_type: ROOT_JAVA_FRAME object_ids: 0x01 } objects { id: 0x01 type_id: 1 self_size: 64 } location_names { iid: 1 str: "TEST:TEST" } types { id: 1 class_name: "FactoryProducerDelegateImplActor" location_id: 1 } continued: false index: 0 } } packet { trusted_packet_sequence_id: 999 heap_graph { pid: 2 location_names { iid: 1 str: "/data/app/~~ASDFG==/invalid.test.android-SDASD/test.apk" } types { id: 1 class_name: "FactoryProducerDelegateImplActor" location_id: 1 } types { id: 2 class_name: "Foo" location_id: 1 } types { id: 3 class_name: "a" location_id: 1 } field_names { iid: 1 str: "FactoryProducerDelegateImplActor.foo" } field_names { iid: 2 str: "a.a" } continued: false index: 1 } } packet { deobfuscation_mapping { package_name: "invalid.test.android" obfuscated_classes { obfuscated_name: "a" deobfuscated_name: "DeobfuscatedA" obfuscated_members { obfuscated_name: "a" deobfuscated_name: "deobfuscatedA" } } } }