比如下面这个libmediakit.so是我们app中的so,它的符号没有解析出来,需要我们这边做什么操作可以让app gallery中解析出来符号吗?
Thread name:OhosPreviewView
#00 pc 000000000001dd18 /system/lib64/chipset-pub-sdk/libutils.z.so(OHOS::RefBase::IncStrongRef(void const*)+0)(740ef54c35849727c23dd415b61a1341)
#01 pc 000000000007262c /system/lib64/chipset-pub-sdk/libsurface.z.so(NativeWindowDisconnect+52)(6861afe7434054d2bd1bfefcee2f04d3)
#02 pc 0000000000034bb0 /system/lib64/libEGL.so(OHOS::EglWrapperDisplay::DestroyEglSurface(void*)+120)(259e1c0d169758857128abf5e6a11845)
#03 pc 0000000000029d88 /system/lib64/libEGL.so(eglDestroySurface+260)(259e1c0d169758857128abf5e6a11845)
#04 pc 00000000000dc380 /data/storage/el1/bundle/libs/arm64/libmediakit.so(9655c06f4bd9307f459841074703edbdfbf338b3)
#05 pc 00000000000dc8a8 /data/storage/el1/bundle/libs/arm64/libmediakit.so(9655c06f4bd9307f459841074703edbdfbf338b3)
#06 pc 000000000012c9a8 /data/storage/el1/bundle/libs/arm64/libmediakit.so(9655c06f4bd9307f459841074703edbdfbf338b3)
#07 pc 00000000000b18a0 /data/storage/el1/bundle/libs/arm64/libmediakit.so(9655c06f4bd9307f459841074703edbdfbf338b3)
#08 pc 00000000000ae528 /data/storage/el1/bundle/libs/arm64/libmediakit.so(9655c06f4bd9307f459841074703edbdfbf338b3)
请参考 “分析CppCrash(进程崩溃)”:
https://developer.huawei.com/consumer/cn/doc/harmonyos-guides-V5/cppcrash-guidelines-V5
里面介绍了 “方式二:通过SDK llvm-addr2line 工具定位行号” 反汇编的处理。