After bugfix BZ#355188 [1], also malloc related global symbols in the Solaris runtime linker are intercepted. This completely breaks memcheck on Solaris because ld.so.1 contains public functions malloc/calloc/free/... with different semantics than from the standard libc & friends. After discussion with Mark W., he suggested that excluding the runtime linker from interception malloc related symbols is desirable: ... That seems a reasonable thing to do in general, the dynamic linker is special and we probably never want to match generic global symbols in it, so maybe do it for any ld.so. [1] https://bugs.kde.org/show_bug.cgi?id=355188
Created attachment 95542 [details] patch for the Solaris runtime linker
Created attachment 95581 [details] proposed patch for all platforms Improved patch. Documentation and comments improved. Existing functionality refactored and targets all platforms.
Commited as SVN r15728.