uml: stop specially protecting kernel stacks
Map all of physical memory as executable to avoid having to change stack protections during fork and exit. unprotect_stack is now called only from MODE_TT code, so it is marked as such. Signed-off-by: Jeff Dike <jdike@linux.intel.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:

committed by
Linus Torvalds

parent
8d82076080
commit
5c8aaceab8
@@ -47,7 +47,9 @@ union thread_union cpu0_irqstack
|
||||
__attribute__((__section__(".data.init_irqstack"))) =
|
||||
{ INIT_THREAD_INFO(init_task) };
|
||||
|
||||
#ifdef CONFIG_MODE_TT
|
||||
void unprotect_stack(unsigned long stack)
|
||||
{
|
||||
os_protect_memory((void *) stack, THREAD_SIZE, 1, 1, 0);
|
||||
}
|
||||
#endif
|
||||
|
Reference in New Issue
Block a user