Jeff Dike 5c8aaceab8 uml: stop specially protecting kernel stacks
Map all of physical memory as executable to avoid having to change stack
protections during fork and exit.

unprotect_stack is now called only from MODE_TT code, so it is marked as such.

Signed-off-by: Jeff Dike <jdike@linux.intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-10-16 09:43:04 -07:00
..
2007-07-24 12:24:58 -07:00
2007-05-11 08:29:33 -07:00
2005-04-16 15:20:36 -07:00
2007-07-29 17:09:29 -07:00
2006-09-27 08:26:16 -07:00
2005-04-16 15:20:36 -07:00
2007-09-19 11:24:18 -07:00
2007-02-11 10:51:22 -08:00
2007-07-24 12:24:58 -07:00
2007-10-16 09:42:49 -07:00
2007-05-07 12:13:01 -07:00
2007-05-07 12:13:01 -07:00
2007-07-29 17:09:29 -07:00
2007-05-07 12:13:01 -07:00
2007-05-07 12:13:04 -07:00
2007-07-19 10:04:41 -07:00
2007-05-11 08:29:33 -07:00
2007-02-11 10:51:24 -08:00