Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262960AbTKYT2z (ORCPT ); Tue, 25 Nov 2003 14:28:55 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262986AbTKYT2z (ORCPT ); Tue, 25 Nov 2003 14:28:55 -0500 Received: from fw.osdl.org ([65.172.181.6]:46725 "EHLO mail.osdl.org") by vger.kernel.org with ESMTP id S262960AbTKYT2y (ORCPT ); Tue, 25 Nov 2003 14:28:54 -0500 Date: Tue, 25 Nov 2003 11:28:45 -0800 From: Chris Wright To: "Ihar 'Philips' Filipau" Cc: Rik van Riel , Linux Kernel Mailing List Subject: Re: 2.2/2.4/2.6 VMs: do malloc() ever return NULL? Message-ID: <20031125112845.A3067@osdlab.pdx.osdl.net> References: <3FC3A797.4060108@softhome.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: <3FC3A797.4060108@softhome.net>; from filia@softhome.net on Tue, Nov 25, 2003 at 08:03:51PM +0100 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 641 Lines: 17 * Ihar 'Philips' Filipau (filia@softhome.net) wrote: > I cannot tell what it does - but name 'security_vm_enough_memory()' > sounds promising ;-) This allows a security module to verify that a process can add mapping for the new pages it's trying to grab. And can be used to control overcommit. thanks, -chris -- Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/