http://gcc.gnu.org/bugzilla/show_bug.cgi?id=56393
--- Comment #16 from Evgeniy Stepanov <eugeni.stepanov at gmail dot com> 2013-02-21 11:51:17 UTC --- (In reply to comment #14) > (In reply to comment #13) > > We've got this problem on Android, where an instrumented JNI library is > > loaded > > into Dalvik VM, which is outside of user control. We "solve" it by requiring > > that the runtime library is LD_PRELOAD-ed into the DVM (Android has a > > mechanism > > to do this on an individual app basis on rooted devices). > > OT, but what is this mechanism you speak of? Currently this bug is the top > google hit for "Dalvik sanitizer LD_PRELOAD", and I don't see how it might > work > if the VM only forks, not execs. https://android.googlesource.com/platform/frameworks/base/+/master/core/java/com/android/internal/os/ZygoteConnection.java See the code for applyInvokeWithSystemProperty(). Also, https://code.google.com/p/address-sanitizer/wiki/Android. Sorry, this page was outdated until just now.