[MDBF-136] MSAN - create instrumented libcrack Created: 2020-09-07  Updated: 2022-02-28  Resolved: 2022-02-28

Status: Closed
Project: MariaDB Foundation Development
Component/s: None
Affects Version/s: None
Fix Version/s: N/A

Type: Task Priority: Major
Reporter: Vlad Bogolin Assignee: Vlad Bogolin
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified

Issue Links:
Duplicate
is duplicated by MDBF-229 Instrumented libcrack for MSAN builder Closed
PartOf
is part of MDBF-41 Milestone 5: Desirable fixes Open
is part of MDEV-20377 Make WITH_MSAN more usable Closed

 Description   

The MSAN builder should use an MSAN instrument libcrack:

CURRENT_TEST: plugins.cracklib_password_check
mysqltest: At line 30: query 'grant select on . to foobar identified by 'q$%^&*rty'' failed: 2013: Lost connection to MySQL server during query

Uninitialized bytes in __interceptor_strchr at offset 8 inside [0x7fbc7d80c150, 9)
==17013==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x7fbc7cadff43 (/usr/lib/x86_64-linux-gnu/libcrack.so.2+0x3f43)
#1 0x7fbc7cae0356 in FascistCheckUser (/usr/lib/x86_64-linux-gnu/libcrack.so.2+0x4356)
#2 0x7fbc7cceb043 in crackme /buildbot/msan-ubuntu-1804-clang10/build/plugin/cracklib_password_check/cracklib_password_check.c:36:13



 Comments   
Comment by Vlad Bogolin [ 2022-02-28 ]

Duplicated task

Generated at Thu Feb 08 03:35:42 UTC 2024 using Jira 8.20.16#820016-sha1:9d11dbea5f4be3d4cc21f03a88dd11d8c8687422.