https://bugs.kde.org/show_bug.cgi?id=407307
Mark Wielaard <m...@klomp.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|REPORTED |RESOLVED --- Comment #1 from Mark Wielaard <m...@klomp.org> --- Briefly discussed on irc and now committed as: commit 89423f5d8ba05a099c2c62227a00a4f4eec59eb3 Author: Mark Wielaard <m...@klomp.org> Date: Tue May 7 21:20:04 2019 +0200 Intercept stpcpy also in ld.so for arm64 On other arches stpcpy () is intercepted for both libc.so and ld.so. But not on arm64, where it is only intercepted for libc.so. This can cause memcheck warnings about the use of stpcpy () in ld.so when called through dlopen () because ld.so contains its own copy of that functions. Fix by introducing VG_Z_LD_LINUX_AARCH64_SO_1 (the encoded name of ld.so on arm64) and using that in vg_replace_strmem.c to intercept stpcpy. https://bugs.kde.org/show_bug.cgi?id=407307 -- You are receiving this mail because: You are watching all bug changes.