Yes, you need this fix: https://android-review.googlesource.com/#/c/318859/
On Wed, May 24, 2017 at 11:41 AM, Francis Ricci <[email protected]> wrote: > Appears to work fine on android 6, so my guess is that 7 introduces a > bug of some sort. > > On Wed, May 24, 2017 at 11:57 AM, Francis Ricci <[email protected]> > wrote: >> Do you have experience using the wrap property? When I attempt to use it, >> even for very simple wrappers on system apps, it crashes the entire phone >> due to a failure to restat the file descriptor table, which appears to >> result from a failure to run CreateFromFd on a pipe (S_ISFIFO) in the >> zygote. This occurs even on system apps (tried >> wrap.com.google.android.youtube, in addition to my own apps), and even when >> the wrapper is as simple as I could come up with (for example, 'setprop >> wrap.com.google.android.youtube "exec $@" '). It reproduces for me on a 5X >> and a 6P running android 7.1.2. Both are rooted, with selinux set to >> permissive. >> >> I could try flashing my phone with an older version of android, if this is >> likely to be a bug in android itself. >> >> On Thursday, May 18, 2017 at 3:48:39 PM UTC-4, Evgeniy Stepanov wrote: >>> >>> Hi, >>> >>> There is a system property that lets you prepend anything to the >>> zygote command line for a specific application, "wrap.<app-name>". It >>> requires a rooted device, but does not require remounting system r/w. >>> >>> In theory, this requirement could be relaxed by allowing wrapping apps >>> even on a locked device based on the app manifest - some property like >>> "debuggable". That requires changing android platform source. >>> >>> https://source.android.com/devices/tech/debug/asan#using_the_wrap_property >>> >>> On Thu, May 18, 2017 at 8:29 AM, Francis Ricci <[email protected]> >>> wrote: >>> > Hi all! >>> > >>> > Historically, I've always used ASan on a rooted/flashed device, as the >>> > asan_device_setup script requires root access. Is it possible (even in >>> > theory, or with some extra work in the codebase) to run ASan on a >>> > non-rooted >>> > device? I know you can for a simple C++ binary, since you can just run >>> > that >>> > via the command-line with LD_PRELOAD. But I know things are quite a bit >>> > more >>> > complex for apps, since you can't over-write app_process without a r/w >>> > system partition. What I've found online so far mostly points to shadow >>> > memory and libc issues. >>> > >>> > It would be quite valuable for me to be able to run ASan on apps on >>> > non-rooted phones (even if I could only get a subset of checks to work), >>> > so >>> > I'd be willing to put in a fair amount of work to make it happen, if >>> > it's >>> > the sort of thing that could be possible. >>> > >>> > Thanks! >>> > Francis >>> > >>> > -- >>> > You received this message because you are subscribed to the Google >>> > Groups >>> > "address-sanitizer" group. >>> > To unsubscribe from this group and stop receiving emails from it, send >>> > an >>> > email to [email protected]. >>> > For more options, visit https://groups.google.com/d/optout. >> >> -- >> You received this message because you are subscribed to the Google Groups >> "address-sanitizer" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to [email protected]. >> For more options, visit https://groups.google.com/d/optout. > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > For more options, visit https://groups.google.com/d/optout. -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
