Disable XOM (eXecute Only Memory) | gradle/cmake

classic Classic list List threaded Threaded
4 messages Options
Reply | Threaded
Open this post in threaded view
|

Disable XOM (eXecute Only Memory) | gradle/cmake

Amol Jindal
Hi,

How can we disable the XOM security feature introduced with API 29?

The documentation provides ways to disable this via `make` command, but how can we disable it via gradle/cmake?

--
You received this message because you are subscribed to the Google Groups "android-ndk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to [hidden email].
To view this discussion on the web visit https://groups.google.com/d/msgid/android-ndk/7c1324ea-6dab-458f-a393-c2ed1f5dfdaao%40googlegroups.com.
Reply | Threaded
Open this post in threaded view
|

Re: Disable XOM (eXecute Only Memory) | gradle/cmake

Ryan Prichard

On Tue, Aug 18, 2020 at 11:04 PM 'Amol Jindal' via android-ndk <[hidden email]> wrote:
Hi,

How can we disable the XOM security feature introduced with API 29?

The documentation provides ways to disable this via `make` command, but how can we disable it via gradle/cmake?

--
You received this message because you are subscribed to the Google Groups "android-ndk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to [hidden email].
To view this discussion on the web visit https://groups.google.com/d/msgid/android-ndk/7c1324ea-6dab-458f-a393-c2ed1f5dfdaao%40googlegroups.com.

--
You received this message because you are subscribed to the Google Groups "android-ndk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to [hidden email].
To view this discussion on the web visit https://groups.google.com/d/msgid/android-ndk/CALgsJz%3DbsaFYZZv9qV6v%2BvKt_pdfw0GoYTz5rGbxSVKVH1D31g%40mail.gmail.com.
Reply | Threaded
Open this post in threaded view
|

Re: Disable XOM (eXecute Only Memory) | gradle/cmake

Amol Jindal
Thanks Ryan. 
I am aware of that previous post, but there is no solution mentioned in that post. We are facing a crash because of XOM on some devices (while it works on other devices). So we want to disable it.

On Tuesday, August 18, 2020 at 11:30:28 PM UTC-7, Ryan Prichard wrote:
This came up previously, <a href="https://groups.google.com/g/android-ndk/c/6xTuTkguftY/m/PNal3kPjAgAJ" target="_blank" rel="nofollow" onmousedown="this.href=&#39;https://groups.google.com/g/android-ndk/c/6xTuTkguftY/m/PNal3kPjAgAJ&#39;;return true;" onclick="this.href=&#39;https://groups.google.com/g/android-ndk/c/6xTuTkguftY/m/PNal3kPjAgAJ&#39;;return true;">https://groups.google.com/g/android-ndk/c/6xTuTkguftY/m/PNal3kPjAgAJ.

-Ryan


On Tue, Aug 18, 2020 at 11:04 PM 'Amol Jindal' via android-ndk <<a href="javascript:" target="_blank" gdf-obfuscated-mailto="ALj0GjFLCAAJ" rel="nofollow" onmousedown="this.href=&#39;javascript:&#39;;return true;" onclick="this.href=&#39;javascript:&#39;;return true;">andro...@...> wrote:
Hi,

How can we disable the XOM security feature introduced with API 29?
<a href="https://source.android.com/devices/tech/debug/execute-only-memory" target="_blank" rel="nofollow" onmousedown="this.href=&#39;https://source.android.com/devices/tech/debug/execute-only-memory&#39;;return true;" onclick="this.href=&#39;https://source.android.com/devices/tech/debug/execute-only-memory&#39;;return true;">https://source.android.com/devices/tech/debug/execute-only-memory

The documentation provides ways to disable this via `make` command, but how can we disable it via gradle/cmake?

--
You received this message because you are subscribed to the Google Groups "android-ndk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to <a href="javascript:" target="_blank" gdf-obfuscated-mailto="ALj0GjFLCAAJ" rel="nofollow" onmousedown="this.href=&#39;javascript:&#39;;return true;" onclick="this.href=&#39;javascript:&#39;;return true;">andro...@googlegroups.com.
To view this discussion on the web visit <a href="https://groups.google.com/d/msgid/android-ndk/7c1324ea-6dab-458f-a393-c2ed1f5dfdaao%40googlegroups.com?utm_medium=email&amp;utm_source=footer" target="_blank" rel="nofollow" onmousedown="this.href=&#39;https://groups.google.com/d/msgid/android-ndk/7c1324ea-6dab-458f-a393-c2ed1f5dfdaao%40googlegroups.com?utm_medium\x3demail\x26utm_source\x3dfooter&#39;;return true;" onclick="this.href=&#39;https://groups.google.com/d/msgid/android-ndk/7c1324ea-6dab-458f-a393-c2ed1f5dfdaao%40googlegroups.com?utm_medium\x3demail\x26utm_source\x3dfooter&#39;;return true;">https://groups.google.com/d/msgid/android-ndk/7c1324ea-6dab-458f-a393-c2ed1f5dfdaao%40googlegroups.com.

--
You received this message because you are subscribed to the Google Groups "android-ndk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to [hidden email].
To view this discussion on the web visit https://groups.google.com/d/msgid/android-ndk/fb46c8a4-f088-4715-a569-ca32e637e157o%40googlegroups.com.
Reply | Threaded
Open this post in threaded view
|

Re: Disable XOM (eXecute Only Memory) | gradle/cmake

John Dallman
In reply to this post by Amol Jindal
A supplementary question: 

https://source.android.com/devices/tech/debug/execute-only-memory says:

> You can manually verify binaries using readelf and checking the segment flags.

I'm failing to figure out just how to do that. If I use "readelf --segments myLib.so", my segment zero contains .hash .gnu.hash .dynsym .dynstr .gnu.version .gnu.version_r .rela.dyn .rela.plt .plt .text .rodata .eh_frame_hdr .eh_frame .note.android.ident  and is marked R E which I presume means Read and Execute. That's fair enough, but when I look at the sections, the only two executable ones are:

   [ 9] .plt              PROGBITS         0000000000116620  00116620
       0000000000000530  0000000000000010  AX       0     0     16
  [10] .text             PROGBITS         0000000000116b50  00116b50
       0000000002d9114c  0000000000000000  AX       0     0     4

Those are both Allocate and eXecute, but I'm not seeing how I can tell if they're readable? The sections output doesn't seem to have a flag for that. 

Thanks, 

John

On Wed, Aug 19, 2020 at 7:04 AM 'Amol Jindal' via android-ndk <[hidden email]> wrote:
Hi,

How can we disable the XOM security feature introduced with API 29?

The documentation provides ways to disable this via `make` command, but how can we disable it via gradle/cmake?

--
You received this message because you are subscribed to the Google Groups "android-ndk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to [hidden email].
To view this discussion on the web visit https://groups.google.com/d/msgid/android-ndk/7c1324ea-6dab-458f-a393-c2ed1f5dfdaao%40googlegroups.com.

--
You received this message because you are subscribed to the Google Groups "android-ndk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to [hidden email].
To view this discussion on the web visit https://groups.google.com/d/msgid/android-ndk/CAH1xqgkvOi9nxFA40c6NQCnPQ0USjdduLCWvoaUkki%3D4BDRhcg%40mail.gmail.com.