#include <linux/smp.h>
#include <linux/security.h>
#include <linux/bootmem.h>
-#include <linux/vs_base.h>
#include <linux/syscalls.h>
#include <linux/vserver/cvirt.h>
EXPORT_SYMBOL(block_all_signals);
EXPORT_SYMBOL(unblock_all_signals);
+
/*
* System call entry points.
*/
return 0;
}
+
/*
* argv [0] = vshelper_path;
* argv [1] = action: "netup", "netdown"
#include <linux/swapops.h>
#include <linux/rmap.h>
#include <linux/module.h>
-#include <linux/vs_memory.h>
#include <linux/syscalls.h>
#include <linux/vs_memory.h>
pgd = pgd_offset(mm, addr);
spin_lock(&mm->page_table_lock);
-
- if (!vx_rsspages_avail(mm, 1))
- goto err_unlock;
if (!vx_rsspages_avail(mm, 1))
goto err_unlock;
if (!may_expand_vm(mm, len >> PAGE_SHIFT))
return -ENOMEM;
- /* check context space, maybe only Private writable mapping? */
- if (!vx_vmpages_avail(mm, len >> PAGE_SHIFT))
- return -ENOMEM;
-
if (accountable && (!(flags & MAP_NORESERVE) ||
sysctl_overcommit_memory == OVERCOMMIT_NEVER)) {
if (vm_flags & VM_SHARED) {
return -ENOMEM;
}
- if (!vx_vmpages_avail(vma->vm_mm, grow))
- return -ENOMEM;
-
/*
* Overcommit.. This must be the final test, as it will
* update security statistics.
if (mm->map_count > sysctl_max_map_count)
return -ENOMEM;
- if (security_vm_enough_memory(len >> PAGE_SHIFT) ||
- !vx_vmpages_avail(mm, len >> PAGE_SHIFT))
+ if (security_vm_enough_memory(len >> PAGE_SHIFT))
return -ENOMEM;
flags = VM_DATA_DEFAULT_FLAGS | VM_ACCOUNT | mm->def_flags;