http://gcc.gnu.org/bugzilla/show_bug.cgi?id=56393



--- Comment #16 from Evgeniy Stepanov <eugeni.stepanov at gmail dot com> 
2013-02-21 11:51:17 UTC ---

(In reply to comment #14)

> (In reply to comment #13)

> > We've got this problem on Android, where an instrumented JNI library is 
> > loaded

> > into Dalvik VM, which is outside of user control. We "solve" it by requiring

> > that the runtime library is LD_PRELOAD-ed into the DVM (Android has a 
> > mechanism

> > to do this on an individual app basis on rooted devices).

> 

> OT, but what is this mechanism you speak of?  Currently this bug is the top

> google hit for "Dalvik sanitizer LD_PRELOAD", and I don't see how it might 
> work

> if the VM only forks, not execs.



https://android.googlesource.com/platform/frameworks/base/+/master/core/java/com/android/internal/os/ZygoteConnection.java



See the code for applyInvokeWithSystemProperty().



Also, https://code.google.com/p/address-sanitizer/wiki/Android.

Sorry, this page was outdated until just now.

Reply via email to