You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
gProfiler makes wide use of /proc/pid/root to access files in the mount namespace of processes.
If a process is chrooted, its /proc/pid/root behaves somewhat differently, breaking our usage. See my note from this py-spy PR:
My understanding is that /proc/pid/root points to the root as the process sees it, while /proc/pid/maps give us paths as WE see it. We (py-spy) are not chrooted when py-spy runs outside the chroot, so we need to strip the chroot from the /proc/pid/maps value. As a generalization, we always strip the path, which in most cases is just / if the process is not chrooted.
gProfiler makes wide use of
/proc/pid/root
to access files in the mount namespace of processes.If a process is chrooted, its
/proc/pid/root
behaves somewhat differently, breaking our usage. See my note from this py-spy PR:java.py
) is.Keywords: chrooted chroot
The text was updated successfully, but these errors were encountered: