Yes, you need this fix:
https://android-review.googlesource.com/#/c/318859/


On Wed, May 24, 2017 at 11:41 AM, Francis Ricci <[email protected]> wrote:
> Appears to work fine on android 6, so my guess is that 7 introduces a
> bug of some sort.
>
> On Wed, May 24, 2017 at 11:57 AM, Francis Ricci <[email protected]> 
> wrote:
>> Do you have experience using the wrap property? When I attempt to use it,
>> even for very simple wrappers on system apps, it crashes the entire phone
>> due to a failure to restat the file descriptor table, which appears to
>> result from a failure to run CreateFromFd on a pipe (S_ISFIFO) in the
>> zygote. This occurs even on system apps (tried
>> wrap.com.google.android.youtube, in addition to my own apps), and even when
>> the wrapper is as simple as I could come up with (for example, 'setprop
>> wrap.com.google.android.youtube "exec $@" '). It reproduces for me on a 5X
>> and a 6P running android 7.1.2. Both are rooted, with selinux set to
>> permissive.
>>
>> I could try flashing my phone with an older version of android, if this is
>> likely to be a bug in android itself.
>>
>> On Thursday, May 18, 2017 at 3:48:39 PM UTC-4, Evgeniy Stepanov wrote:
>>>
>>> Hi,
>>>
>>> There is a system property that lets you prepend anything to the
>>> zygote command line for a specific application, "wrap.<app-name>". It
>>> requires a rooted device, but does not require remounting system r/w.
>>>
>>> In theory, this requirement could be relaxed by allowing wrapping apps
>>> even on a locked device based on the app manifest - some property like
>>> "debuggable". That requires changing android platform source.
>>>
>>> https://source.android.com/devices/tech/debug/asan#using_the_wrap_property
>>>
>>> On Thu, May 18, 2017 at 8:29 AM, Francis Ricci <[email protected]>
>>> wrote:
>>> > Hi all!
>>> >
>>> > Historically, I've always used ASan on a rooted/flashed device, as the
>>> > asan_device_setup script requires root access. Is it possible (even in
>>> > theory, or with some extra work in the codebase) to run ASan on a
>>> > non-rooted
>>> > device? I know you can for a simple C++ binary, since you can just run
>>> > that
>>> > via the command-line with LD_PRELOAD. But I know things are quite a bit
>>> > more
>>> > complex for apps, since you can't over-write app_process without a r/w
>>> > system partition. What I've found online so far mostly points to shadow
>>> > memory and libc issues.
>>> >
>>> > It would be quite valuable for me to be able to run ASan on apps on
>>> > non-rooted phones (even if I could only get a subset of checks to work),
>>> > so
>>> > I'd be willing to put in a fair amount of work to make it happen, if
>>> > it's
>>> > the sort of thing that could be possible.
>>> >
>>> > Thanks!
>>> > Francis
>>> >
>>> > --
>>> > You received this message because you are subscribed to the Google
>>> > Groups
>>> > "address-sanitizer" group.
>>> > To unsubscribe from this group and stop receiving emails from it, send
>>> > an
>>> > email to [email protected].
>>> > For more options, visit https://groups.google.com/d/optout.
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "address-sanitizer" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected].
>> For more options, visit https://groups.google.com/d/optout.
>
> --
> You received this message because you are subscribed to the Google Groups 
> "address-sanitizer" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to