uml: stop specially protecting kernel stacks
authorJeff Dike <jdike@addtoit.com>
Tue, 16 Oct 2007 08:26:46 +0000 (01:26 -0700)
committerLinus Torvalds <torvalds@woody.linux-foundation.org>
Tue, 16 Oct 2007 16:43:04 +0000 (09:43 -0700)
commit5c8aaceab88ac787c0a4038b29143c954c2a45e0
tree9277518e77cac9e1f97d826fa8962d1c861a9e40
parent8d82076080d909f18dea859a6767df7e3ff69241
uml: stop specially protecting kernel stacks

Map all of physical memory as executable to avoid having to change stack
protections during fork and exit.

unprotect_stack is now called only from MODE_TT code, so it is marked as such.

Signed-off-by: Jeff Dike <jdike@linux.intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
arch/um/include/kern_util.h
arch/um/kernel/init_task.c
arch/um/kernel/physmem.c
arch/um/kernel/process.c