linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* Prevent self modifying code.
@ 2006-10-09 16:18 James Courtier-Dutton
  0 siblings, 0 replies; only message in thread
From: James Courtier-Dutton @ 2006-10-09 16:18 UTC (permalink / raw)
  To: linux-mm

Hi,

1) In linux, is it possible to enforce that all pages with executable
program code are automatically marked read-only? I.e. to actively
prevent any self modifying code.
2) I know there is a NX(no execute) bit. Is that automatically applied
to all read-write pages? i.e to stack and data pages.
3) Is it possible to ensure that the kernel is the only place that can
take files with the +x bit set, and load the program code into memory
then mark it as read-only, executable pages.
4) Is it possible to ensure that all jump tables used by the executable
code are also read-only?

James




--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2006-10-09 16:18 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-10-09 16:18 Prevent self modifying code James Courtier-Dutton

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox