[Bug 275270] sanitizer re-exec with ASLR off fails

From: <bugzilla-noreply_at_freebsd.org>
Date: Wed, 22 Nov 2023 22:28:06 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275270

            Bug ID: 275270
           Summary: sanitizer re-exec with ASLR off fails
           Product: Base System
           Version: 14.0-RELEASE
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: bin
          Assignee: bugs@FreeBSD.org
          Reporter: emaste@freebsd.org
                CC: dim@FreeBSD.org
            Blocks: 275215

Tracking PR for 14.0 EN for:

commit 4c9a0adad18263ec8725d9bfc5f560c6ad1da8bd
Author: Dimitry Andric <dim@FreeBSD.org>
Date:   Wed Nov 22 19:23:06 2023 +0100

    compiler-rt: avoid segfaults when re-exec'ing with ASLR

    After 930a7c2ac67e ("compiler-rt: re-exec with ASLR disabled when
    necessary") and 96fe7c8ab0f6 ("compiler-rt: support ReExec() on
    FreeBSD"), binaries linked against the sanitizer libraries may segfault
    due to procctl(2) being intercepted. Instead, the non-intercepted
    internal_procctl() should be called.

    Similarly, the ReExec() function that re-executes the binary after
    turning off ASLR should not call elf_aux_info(3) and realpath(3), since
    these will also be intercepted. Instead, loop directly over the elf aux
    info vector to find the executable path, and avoid calling realpath(3)
    since it is actually unwanted for this use case.

    Fixes:          930a7c2ac67e, 96fe7c8ab0f6
    MFC after:      3 days


Referenced Bugs:

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275215
[Bug 275215] tracking bug for 14.0 errata
-- 
You are receiving this mail because:
You are the assignee for the bug.