[pcre-dev] [Bug 2618] Patch with JIT support for macOS ARM64…

Top Page

Reply to this message
Author: admin
Date:  
To: pcre-dev
Subject: [pcre-dev] [Bug 2618] Patch with JIT support for macOS ARM64 hardware
https://bugs.exim.org/show_bug.cgi?id=2618

--- Comment #5 from Stuart <stuart.carnie@???> ---
Apple has provided explicit documentation for Porting JITs to arm64 hardware,
including reference to the MAP_JIT flag for the hardened runtime.

-
https://developer.apple.com/documentation/apple_silicon/porting_just-in-time_compilers_to_apple_silicon

We are not using the Hardened Runtime, however, pay careful attention to the
first paragraph of the “Disable Write Protections Before You Generate
Instructions”, noting:

“Apple silicon enables this feature for all apps, regardless of whether they
adopt the Hardened Runtime.”

Meaning we have to adhere to the W^X security restrictions.

The entire paragraph is included for convenience below.

——

Disable Write Protections Before You Generate Instructions

When memory protections are enabled, you cannot configure memory regions as
writable and executable at the same time. Apple silicon enables this feature
for all apps, regardless of whether they adopt the Hardened Runtime.
Intel-based Mac computers enable this feature only for apps that adopt the
Hardened Runtime.

--
You are receiving this mail because:
You are on the CC list for the bug.