Appears to work fine on android 6, so my guess is that 7 introduces a
bug of some sort.

On Wed, May 24, 2017 at 11:57 AM, Francis Ricci <[email protected]> wrote:
> Do you have experience using the wrap property? When I attempt to use it,
> even for very simple wrappers on system apps, it crashes the entire phone
> due to a failure to restat the file descriptor table, which appears to
> result from a failure to run CreateFromFd on a pipe (S_ISFIFO) in the
> zygote. This occurs even on system apps (tried
> wrap.com.google.android.youtube, in addition to my own apps), and even when
> the wrapper is as simple as I could come up with (for example, 'setprop
> wrap.com.google.android.youtube "exec $@" '). It reproduces for me on a 5X
> and a 6P running android 7.1.2. Both are rooted, with selinux set to
> permissive.
>
> I could try flashing my phone with an older version of android, if this is
> likely to be a bug in android itself.
>
> On Thursday, May 18, 2017 at 3:48:39 PM UTC-4, Evgeniy Stepanov wrote:
>>
>> Hi,
>>
>> There is a system property that lets you prepend anything to the
>> zygote command line for a specific application, "wrap.<app-name>". It
>> requires a rooted device, but does not require remounting system r/w.
>>
>> In theory, this requirement could be relaxed by allowing wrapping apps
>> even on a locked device based on the app manifest - some property like
>> "debuggable". That requires changing android platform source.
>>
>> https://source.android.com/devices/tech/debug/asan#using_the_wrap_property
>>
>> On Thu, May 18, 2017 at 8:29 AM, Francis Ricci <[email protected]>
>> wrote:
>> > Hi all!
>> >
>> > Historically, I've always used ASan on a rooted/flashed device, as the
>> > asan_device_setup script requires root access. Is it possible (even in
>> > theory, or with some extra work in the codebase) to run ASan on a
>> > non-rooted
>> > device? I know you can for a simple C++ binary, since you can just run
>> > that
>> > via the command-line with LD_PRELOAD. But I know things are quite a bit
>> > more
>> > complex for apps, since you can't over-write app_process without a r/w
>> > system partition. What I've found online so far mostly points to shadow
>> > memory and libc issues.
>> >
>> > It would be quite valuable for me to be able to run ASan on apps on
>> > non-rooted phones (even if I could only get a subset of checks to work),
>> > so
>> > I'd be willing to put in a fair amount of work to make it happen, if
>> > it's
>> > the sort of thing that could be possible.
>> >
>> > Thanks!
>> > Francis
>> >
>> > --
>> > You received this message because you are subscribed to the Google
>> > Groups
>> > "address-sanitizer" group.
>> > To unsubscribe from this group and stop receiving emails from it, send
>> > an
>> > email to [email protected].
>> > For more options, visit https://groups.google.com/d/optout.
>
> --
> You received this message because you are subscribed to the Google Groups
> "address-sanitizer" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to