Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That is not at all what happens. W^X is not the problem. W^X is already enabled by default. Executable pages are not mapped in as writable even if the image file is writable. The security argument is bullshit.

The problem is that they don't want you mapping code from anywhere other than your strictly read only .apk.

There is no workaround proposed there other than shipping every single piece of executable code with the .apk.

Sure, you can workaround right now with proot or the like by creating your own executable loader, but who guarantees this works with Android 11? It is also a violation of their policy.

In fact, what they are saying there is that eventually fork and exec are going to be deprecated because they disalign with the Android process model.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: