Building with address sanitizer, HAVE_BROKEN_MLOCK is enabled.
In this case secmem does not work (as it's incompatible to address sanitizer). Current code assumes that HAVE_BROKEN_MLOCK is for some particular OS like HP/UX or AIX, so, we need some fix to address address sanitizer case.
Description
Description
Revisions and Commits
Revisions and Commits
Related Objects
Related Objects
Event Timeline
Comment Actions
For the initial attempt, I push: rCfe06287003a1: secmem: Handle HAVE_BROKEN_MLOCK for the case with ASAN.
This is better than nothing.
Comment Actions
There's GCRYPT_IN_ASAN_TEST environment variable check in tests/t-secmen.c and tests/t-sexp.c. Are those check needed after this change? Could they be removed?
Comment Actions
@jukivili
Thanks for your feedback.
Are those check needed after this change? Could they be removed?
Those checks are not needed any more, as secmem pretends working with HAVE_BROKEN_MLOCK.
Please remove them.
Comment Actions
Note that:
If we consider backporting this to 1.10/1.11 branch, we also need to apply: rCdef1d4ea8f66: random:jent: Fix build with address sanitizer.