Re: How to forbid user space and kernel executable pages from becoming writable?

2019-01-05 Thread valdis . kletnieks
On Sat, 05 Jan 2019 18:30:01 +0300, Lev Olshvang said: > Some articles, ex > https://shanetully.com/2013/12/writing-a-self-mutating-x86_64-c-program/ > state that mprotect() can change protection of executable section. Note that appears to be a 5 year old article, and one that tries to be

How to forbid user space and kernel executable pages from becoming writable?

2019-01-05 Thread Lev Olshvang
I am researching this issue and I am confused with the finding Some articles, ex https://shanetully.com/2013/12/writing-a-self-mutating-x86_64-c-program/ state that mprotect() can change protection of executable section. As I understanf pte entry has page protection bits set to RO so mprotect