Details
-
Bug
-
Status: Open (View Workflow)
-
Major
-
Resolution: Unresolved
-
None
-
None
-
None
-
None
Description
Like aarch64 (CONC-774) recent x86-64 CPUs support similar protection. Intel calls it "Control Flow Enforcement Technology (CET)", in particular "Indirect Branch Tracking (IBT)".
It's enabled with gcc -fcf-protection=branch flag and requires IBT to be present in readelf -n unittest/libmariadb/async (and, supposedly, in glibc tunables?)
See also https://h3xduck.github.io/cfi/2025/06/26/enabling-intel-cet.html.
Allegedly, if enabled, it'll cause the same crash on x86-64 as CONC-744 was on aarch64
Attachments
Issue Links
- relates to
-
CONC-774 non blocking API usage crashes on arm64 with Branch Target Identification (BTI)
-
- Closed
-