diff options
author | Jeff Dike <jdike@addtoit.com> | 2007-10-16 01:26:46 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@woody.linux-foundation.org> | 2007-10-16 09:43:04 -0700 |
commit | 5c8aaceab88ac787c0a4038b29143c954c2a45e0 (patch) | |
tree | 9277518e77cac9e1f97d826fa8962d1c861a9e40 /arch/um/include | |
parent | 8d82076080d909f18dea859a6767df7e3ff69241 (diff) |
uml: stop specially protecting kernel stacks
Map all of physical memory as executable to avoid having to change stack
protections during fork and exit.
unprotect_stack is now called only from MODE_TT code, so it is marked as such.
Signed-off-by: Jeff Dike <jdike@linux.intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'arch/um/include')
-rw-r--r-- | arch/um/include/kern_util.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/arch/um/include/kern_util.h b/arch/um/include/kern_util.h index 6c2be26f1d7..b84b5dadb95 100644 --- a/arch/um/include/kern_util.h +++ b/arch/um/include/kern_util.h @@ -82,7 +82,9 @@ extern void check_stack_overflow(void *ptr); extern void relay_signal(int sig, union uml_pt_regs *regs); extern int user_context(unsigned long sp); extern void timer_irq(union uml_pt_regs *regs); +#ifdef CONFIG_MODE_TT extern void unprotect_stack(unsigned long stack); +#endif extern void do_uml_exitcalls(void); extern int attach_debugger(int idle_pid, int pid, int stop); extern int config_gdb(char *str); |