Hi all!

Historically, I've always used ASan on a rooted/flashed device, as the 
asan_device_setup script requires root access. Is it possible (even in 
theory, or with some extra work in the codebase) to run ASan on a 
non-rooted device? I know you can for a simple C++ binary, since you can 
just run that via the command-line with LD_PRELOAD. But I know things are 
quite a bit more complex for apps, since you can't over-write app_process 
without a r/w system partition. What I've found online so far mostly points 
to shadow memory and libc issues.

It would be quite valuable for me to be able to run ASan on apps on 
non-rooted phones (even if I could only get a subset of checks to work), so 
I'd be willing to put in a fair amount of work to make it happen, if it's 
the sort of thing that could be possible.

Thanks!
Francis

-- 
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to