Hi all! Historically, I've always used ASan on a rooted/flashed device, as the asan_device_setup script requires root access. Is it possible (even in theory, or with some extra work in the codebase) to run ASan on a non-rooted device? I know you can for a simple C++ binary, since you can just run that via the command-line with LD_PRELOAD. But I know things are quite a bit more complex for apps, since you can't over-write app_process without a r/w system partition. What I've found online so far mostly points to shadow memory and libc issues.
It would be quite valuable for me to be able to run ASan on apps on non-rooted phones (even if I could only get a subset of checks to work), so I'd be willing to put in a fair amount of work to make it happen, if it's the sort of thing that could be possible. Thanks! Francis -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
