Hi, Am 01.05.19 um 00:31 schrieb Steinar H. Gunderson: > On Tue, Apr 30, 2019 at 11:23:52PM +0100, Simon McVittie wrote: >>> On a quick analysis: It appears that etw tries to find its own path by >>> opening /proc/self/maps (code is in etw/prefix.c), looking for an executable >>> mapping (r-xp) that contains the string "", and then looking at the path. >> This seems unnecessarily complicated? /proc/self/maps is Linux-specific, >> and if relying on Linux-specific things is acceptable, then >> evaluating the symlink /proc/self/exe seems a lot easier. (See >> e.g. Sys_FindExecutableName() in darkplaces.) > > Yes; it seems to be written by someone whose primary experience was with > Windows, given that it talks about LINUX and not Linux. :-) > > However, given that we are in deep freeze, you probably want the smallest > possible fix for buster. > > /* Steinar */
Thanks for providing a solution and a way forward. Could you provide a trivial fix/patch as well? I'm willing to test it and ask the release team for an unblock. I currently don't understand the underlying issue and why it was triggered in the first place but I gladly accept patches. Regards, Markus
signature.asc
Description: OpenPGP digital signature