I have a question about memory protection. I appreciate any suggestion.
Thank you so much.
Given a virtual address, how can we know whether this address contains
an executable code? If there is a method that can be used to answer
the above question, is there any exception for this method?
PS:
(a)Could we get the result by checking the VM_EXECUTABLE attribute of
the vm_flags of the vm_area_struct for the memory area that contains
that address? If yes, does this apply to x86 architecture?
(b) Could information in vm_page_prot of vm_area_struct or in
struct mem_map_t help? If yes, which attribute and how?
Best Regards,
FuHau
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/