kib a280ada6e7 Use the previous stack entry protection and max protection to correctly
propagate the stack execution permissions when stack is grown down.

First, curproc->p_sysent->sv_stackprot specifies maximum allowed stack
protection for current ABI, so the new stack entry was typically marked
executable always. Second, for non-main stack MAP_STACK mapping,
the PROT_ flags should be used which were specified at the mmap(2) call
time, and not sv_stackprot.

MFC after:	1 week
2012-06-10 11:31:50 +00:00
..
2012-06-10 02:38:51 +00:00
2012-06-10 02:38:51 +00:00
2012-06-10 11:17:14 +00:00
2012-05-23 06:49:50 +00:00
2012-06-10 02:38:51 +00:00
2012-06-10 06:31:54 +00:00
2012-05-24 22:00:48 +00:00
2012-06-05 17:44:54 +00:00
2012-06-09 10:04:40 +00:00
2012-02-28 15:07:05 +00:00
2012-05-03 08:56:43 +00:00
2012-05-24 11:20:51 +00:00
2012-04-16 10:33:46 +00:00