Skip to content

[UBSan] Runtime Executable Only violation hit when checking the function pointer on an execute-only target. #64931

Closed
@MaggieYingYi

Description

@MaggieYingYi

An execute-only target disallows data access to code sections.

The commit rG279a4d causes the generated code to read text section data which is not allowed on an execute-only target.

When enabling the function sanitizer (-fsanitize=function), UBSan function signatures and type hashes are emitted within the function's prologue data to check the function type. This results in the non-execute access and a runtime error.

Metadata

Metadata

Assignees

Type

No type

Projects

Status

Done

Relationships

None yet

Development

No branches or pull requests

Issue actions