The Chromium project uses symbolize.h, and symbolize.cc for symbolization of
stack traces.
As of r137, the code in symbolize.* doesn't work inside sandboxed processes due
to inability to open /proc/self/maps and the object files for the modules that
are loaded in the process.
A possible solution can be to provide a callback mechanism to replace
OpenObjectFileContainingPcAndGetStartAddress. A sandboxed process can provide
a custom implementation of this function and register it as a callback.
Original issue reported on code.google.com by iva...@google.com on 21 Feb 2014 at 7:49
Original issue reported on code.google.com by
iva...@google.com
on 21 Feb 2014 at 7:49