mirror of
https://github.com/Qortal/Brooklyn.git
synced 2025-01-31 07:12:18 +00:00
2a709f28fa
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
22 lines
493 B
C
22 lines
493 B
C
#ifndef __ASM_GENERIC_HARDIRQ_H
|
|
#define __ASM_GENERIC_HARDIRQ_H
|
|
|
|
#include <linux/cache.h>
|
|
#include <linux/threads.h>
|
|
|
|
typedef struct {
|
|
unsigned int __softirq_pending;
|
|
} ____cacheline_aligned irq_cpustat_t;
|
|
|
|
#include <linux/irq_cpustat.h> /* Standard mappings for irq_cpustat_t above */
|
|
#include <linux/irq.h>
|
|
|
|
#ifndef ack_bad_irq
|
|
static inline void ack_bad_irq(unsigned int irq)
|
|
{
|
|
printk(KERN_CRIT "unexpected IRQ trap at vector %02x\n", irq);
|
|
}
|
|
#endif
|
|
|
|
#endif /* __ASM_GENERIC_HARDIRQ_H */
|