From 5c8aaceab88ac787c0a4038b29143c954c2a45e0 Mon Sep 17 00:00:00 2001 From: Jeff Dike Date: Tue, 16 Oct 2007 01:26:46 -0700 Subject: uml: stop specially protecting kernel stacks Map all of physical memory as executable to avoid having to change stack protections during fork and exit. unprotect_stack is now called only from MODE_TT code, so it is marked as such. Signed-off-by: Jeff Dike Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds --- arch/um/kernel/init_task.c | 2 ++ 1 file changed, 2 insertions(+) (limited to 'arch/um/kernel/init_task.c') diff --git a/arch/um/kernel/init_task.c b/arch/um/kernel/init_task.c index cba516e6c99..fa90db964b2 100644 --- a/arch/um/kernel/init_task.c +++ b/arch/um/kernel/init_task.c @@ -47,7 +47,9 @@ union thread_union cpu0_irqstack __attribute__((__section__(".data.init_irqstack"))) = { INIT_THREAD_INFO(init_task) }; +#ifdef CONFIG_MODE_TT void unprotect_stack(unsigned long stack) { os_protect_memory((void *) stack, THREAD_SIZE, 1, 1, 0); } +#endif -- cgit v1.2.3