https://bugs.exim.org/show_bug.cgi?id=2618
--- Comment #5 from Stuart <stuart.carnie@???> ---
Apple has provided explicit documentation for Porting JITs to arm64 hardware,
including reference to the MAP_JIT flag for the hardened runtime.
-
https://developer.apple.com/documentation/apple_silicon/porting_just-in-time_compilers_to_apple_silicon
We are not using the Hardened Runtime, however, pay careful attention to the
first paragraph of the âDisable Write Protections Before You Generate
Instructionsâ, noting:
âApple silicon enables this feature for all apps, regardless of whether they
adopt the Hardened Runtime.â
Meaning we have to adhere to the W^X security restrictions.
The entire paragraph is included for convenience below.
ââ
Disable Write Protections Before You Generate Instructions
When memory protections are enabled, you cannot configure memory regions as
writable and executable at the same time. Apple silicon enables this feature
for all apps, regardless of whether they adopt the Hardened Runtime.
Intel-based Mac computers enable this feature only for apps that adopt the
Hardened Runtime.
--
You are receiving this mail because:
You are on the CC list for the bug.