https://bugs.kde.org/show_bug.cgi?id=407307

Mark Wielaard <m...@klomp.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|---                         |FIXED
             Status|REPORTED                    |RESOLVED

--- Comment #1 from Mark Wielaard <m...@klomp.org> ---
Briefly discussed on irc and now committed as:

commit 89423f5d8ba05a099c2c62227a00a4f4eec59eb3
Author: Mark Wielaard <m...@klomp.org>
Date:   Tue May 7 21:20:04 2019 +0200

    Intercept stpcpy also in ld.so for arm64

    On other arches stpcpy () is intercepted for both libc.so and ld.so.
    But not on arm64, where it is only intercepted for libc.so.

    This can cause memcheck warnings about the use of stpcpy () in ld.so
    when called through dlopen () because ld.so contains its own copy of
    that functions.

    Fix by introducing VG_Z_LD_LINUX_AARCH64_SO_1 (the encoded name of
    ld.so on arm64) and using that in vg_replace_strmem.c to intercept
    stpcpy.

    https://bugs.kde.org/show_bug.cgi?id=407307

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to