Hi,

There is a system property that lets you prepend anything to the
zygote command line for a specific application, "wrap.<app-name>". It
requires a rooted device, but does not require remounting system r/w.

In theory, this requirement could be relaxed by allowing wrapping apps
even on a locked device based on the app manifest - some property like
"debuggable". That requires changing android platform source.

https://source.android.com/devices/tech/debug/asan#using_the_wrap_property

On Thu, May 18, 2017 at 8:29 AM, Francis Ricci <[email protected]> wrote:
> Hi all!
>
> Historically, I've always used ASan on a rooted/flashed device, as the
> asan_device_setup script requires root access. Is it possible (even in
> theory, or with some extra work in the codebase) to run ASan on a non-rooted
> device? I know you can for a simple C++ binary, since you can just run that
> via the command-line with LD_PRELOAD. But I know things are quite a bit more
> complex for apps, since you can't over-write app_process without a r/w
> system partition. What I've found online so far mostly points to shadow
> memory and libc issues.
>
> It would be quite valuable for me to be able to run ASan on apps on
> non-rooted phones (even if I could only get a subset of checks to work), so
> I'd be willing to put in a fair amount of work to make it happen, if it's
> the sort of thing that could be possible.
>
> Thanks!
> Francis
>
> --
> You received this message because you are subscribed to the Google Groups
> "address-sanitizer" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to