-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unprivileged normalize API #518
Comments
This is somewhat a different use case from the issues I previously submitted. Thanks again for being so fast in considering my issues. |
Yeah, I can see it being useful to have a solution for cases where fewer permissions are available. We changed this behavior with 327f288 and effectively requiring
What are you referring to when you say "from source"? We still keep what we call the symbolic path around, so we could introduce an option to use that instead of the |
@r1viollet I created #520, which I'd think should cater to your use case, if you set the |
Closed via 8415b4e |
Sorry for the late feedback. I was out for some days. This worked well for us! Thank you 🙇 |
Description
When using the current normalize API, we require elevated permissions. This is due to the usage of map_files.
Here is for instance the failing syscall from a strace:
We could propose a normalization API that works from source.
The logic would be similar to what we propose here
This uses the mapping information (from
proc/<PID>/maps
) and the segment information from the file. Finding files associated to mappings can be a challenge. So perhaps it should be the responsibility of the user, to provide the matching elf file.Motivation
This would allow us to use the API within a process (or a child process) to symbolize itself (or the parent).
Our use case is to annotate crashes or errors with associated symbols. From the associated stack trace, we could normalize and symbolize from source.
The text was updated successfully, but these errors were encountered: