On Tue, Apr 30, 2019 at 11:23:52PM +0100, Simon McVittie wrote: >> On a quick analysis: It appears that etw tries to find its own path by >> opening /proc/self/maps (code is in etw/prefix.c), looking for an executable >> mapping (r-xp) that contains the string "", and then looking at the path. > This seems unnecessarily complicated? /proc/self/maps is Linux-specific, > and if relying on Linux-specific things is acceptable, then > evaluating the symlink /proc/self/exe seems a lot easier. (See > e.g. Sys_FindExecutableName() in darkplaces.)
Yes; it seems to be written by someone whose primary experience was with Windows, given that it talks about LINUX and not Linux. :-) However, given that we are in deep freeze, you probably want the smallest possible fix for buster. /* Steinar */ -- Homepage: https://www.sesse.net/