The previous approach only worked if the traced executable was invoked
via its fully qualified path. Using readlink to determine the full
qualified path of the traced executable works reliably even when the
traced executable is started via PATH lookup.
Signed-off-by: Paul Woegerer <paul_woegerer@mentor.com>
Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
void dump_exec_baddr(struct extract_data *data)
{
void *owner = data->owner;
void dump_exec_baddr(struct extract_data *data)
{
void *owner = data->owner;
- Dl_info dl_info = { 0 };
- char resolved_path[PATH_MAX];
+ char exe_path[PATH_MAX];
+ ssize_t exe_len;
base_addr_ptr = data->exec_baddr;
if (!base_addr_ptr)
return;
/*
base_addr_ptr = data->exec_baddr;
if (!base_addr_ptr)
return;
/*
- * We have to use Dl_info to determine the executable full path.
+ * We have to use /proc/self/exe to determine the executable full
+ * path.
- if (!dladdr(base_addr_ptr, &dl_info))
+ exe_len = readlink("/proc/self/exe", exe_path, sizeof(exe_path) - 1);
+ if (exe_len <= 0)
- if (!realpath(dl_info.dli_fname, resolved_path))
- return;
- trace_baddr(base_addr_ptr, resolved_path, 0, owner);
+ exe_path[exe_len] = '\0';
+ trace_baddr(base_addr_ptr, exe_path, 0, owner);
}
int lttng_ust_baddr_statedump(void *owner)
}
int lttng_ust_baddr_statedump(void *owner)