From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 21612 invoked by alias); 21 Feb 2013 10:54:46 -0000 Received: (qmail 21197 invoked by uid 48); 21 Feb 2013 10:54:15 -0000 From: "amonakov at gcc dot gnu.org" To: gcc-bugs@gcc.gnu.org Subject: [Bug sanitizer/56393] SIGSEGV when -fsanitize=address and dynamic lib with global objects Date: Thu, 21 Feb 2013 10:54:00 -0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: sanitizer X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: amonakov at gcc dot gnu.org X-Bugzilla-Status: ASSIGNED X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: unassigned at gcc dot gnu.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Changed-Fields: CC Message-ID: In-Reply-To: References: X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Mailing-List: contact gcc-bugs-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-bugs-owner@gcc.gnu.org X-SW-Source: 2013-02/txt/msg02153.txt.bz2 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=56393 Alexander Monakov changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |amonakov at gcc dot gnu.org --- Comment #14 from Alexander Monakov 2013-02-21 10:54:13 UTC --- (In reply to comment #13) > We've got this problem on Android, where an instrumented JNI library is loaded > into Dalvik VM, which is outside of user control. We "solve" it by requiring > that the runtime library is LD_PRELOAD-ed into the DVM (Android has a mechanism > to do this on an individual app basis on rooted devices). OT, but what is this mechanism you speak of? Currently this bug is the top google hit for "Dalvik sanitizer LD_PRELOAD", and I don't see how it might work if the VM only forks, not execs.