On Tue, 30 Apr 2019 at 23:04:50 +0200, Steinar H. Gunderson wrote: > On a quick analysis: It appears that etw tries to find its own path by > opening /proc/self/maps (code is in etw/prefix.c), looking for an executable > mapping (r-xp) that contains the string "", and then looking at the path.
This seems unnecessarily complicated? /proc/self/maps is Linux-specific, and if relying on Linux-specific things is acceptable, then evaluating the symlink /proc/self/exe seems a lot easier. (See e.g. Sys_FindExecutableName() in darkplaces.) smcv