linux/arch/um/kernel/skas
Tiwei Bie f7e9077a16 um: Stop tracking stub's PID via userspace_pid[]
The PID of the stub process can be obtained from current_mm_id().
There is no need to track it via userspace_pid[]. Stop doing that
to simplify the code.

Signed-off-by: Tiwei Bie <tiwei.btw@antgroup.com>
Link: https://patch.msgid.link/20250711065021.2535362-4-tiwei.bie@linux.dev
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
2025-07-13 19:42:49 +02:00
..
.gitignore um: use execveat to create userspace MMs 2024-10-10 13:37:16 +02:00
Makefile um: fix stub exe build with CONFIG_GCOV 2024-10-26 16:06:10 +02:00
mmu.c um: Make mm_list and mm_list_lock static 2025-07-11 08:49:18 +02:00
process.c um: Stop tracking stub's PID via userspace_pid[] 2025-07-13 19:42:49 +02:00
stub_exe_embed.S um: use execveat to create userspace MMs 2024-10-10 13:37:16 +02:00
stub_exe.c um: pass FD for memory operations when needed 2025-06-02 16:20:10 +02:00
stub.c um: pass FD for memory operations when needed 2025-06-02 16:20:10 +02:00
syscall.c um: simplify syscall header files 2025-07-11 08:49:02 +02:00
uaccess.c um: document arch_futex_atomic_op_inuser 2024-01-04 22:08:57 +01:00