original_kernel/arch/um/include
Jeff Dike 5c8aaceab8 uml: stop specially protecting kernel stacks
Map all of physical memory as executable to avoid having to change stack
protections during fork and exit.

unprotect_stack is now called only from MODE_TT code, so it is marked as such.

Signed-off-by: Jeff Dike <jdike@linux.intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-10-16 09:43:04 -07:00
..
skas
sysdep-i386
sysdep-ia64
sysdep-ppc
sysdep-x86_64
tt
aio.h
arch.h
as-layout.h
chan_kern.h
chan_user.h
choose-mode.h
common-offsets.h
elf_user.h
frame_kern.h
init.h
initrd.h
irq_kern.h
irq_user.h
kern.h
kern_util.h
line.h
longjmp.h
mconsole.h
mconsole_kern.h
mem.h
mem_kern.h
mem_user.h
misc_constants.h
mode.h
mode_kern.h
net_kern.h
net_user.h
os.h
process.h
ptrace_user.h
registers.h
sigcontext.h
sigio.h
signal_kern.h
skas_ptrace.h
skas_ptregs.h
syscall.h
sysrq.h
task.h
tempfile.h
tlb.h
ubd_user.h
um_malloc.h
um_mmu.h
um_uaccess.h
uml_uaccess.h
user.h