From 5c8aaceab88ac787c0a4038b29143c954c2a45e0 Mon Sep 17 00:00:00 2001 From: Jeff Dike Date: Tue, 16 Oct 2007 01:26:46 -0700 Subject: uml: stop specially protecting kernel stacks Map all of physical memory as executable to avoid having to change stack protections during fork and exit. unprotect_stack is now called only from MODE_TT code, so it is marked as such. Signed-off-by: Jeff Dike Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds --- arch/um/include/kern_util.h | 2 ++ 1 file changed, 2 insertions(+) (limited to 'arch/um/include/kern_util.h') diff --git a/arch/um/include/kern_util.h b/arch/um/include/kern_util.h index 6c2be26f1d7..b84b5dadb95 100644 --- a/arch/um/include/kern_util.h +++ b/arch/um/include/kern_util.h @@ -82,7 +82,9 @@ extern void check_stack_overflow(void *ptr); extern void relay_signal(int sig, union uml_pt_regs *regs); extern int user_context(unsigned long sp); extern void timer_irq(union uml_pt_regs *regs); +#ifdef CONFIG_MODE_TT extern void unprotect_stack(unsigned long stack); +#endif extern void do_uml_exitcalls(void); extern int attach_debugger(int idle_pid, int pid, int stop); extern int config_gdb(char *str); -- cgit v1.2.3