You keep revising what you "meant" to say (forgetting the self-sufficient sentences that are just factually wrong, which no ex post facto revising can fix), and again your revisions are completely wrong.
You say "Of course if module interface is available, one can load a malicious code that can set arbitrary memory as both writable and executable."
Wrong again; module support isn't necessary to set arbitrary memory as both writable and executable. And yes, it can be done purely with read() and write() on /dev/mem as I've already said. You can call it a "trick" if you like, but if you did the reading I suggested it would be simply "textbook behavior."
Since you're clearly unwilling to educate yourself, there's no point really in wasting any more time with this.