mirror of
https://github.com/Qortal/Brooklyn.git
synced 2025-01-31 07:12:18 +00:00
2a709f28fa
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
19 lines
364 B
C
19 lines
364 B
C
#ifndef __ASM_GENERIC_IRQ_H
|
|
#define __ASM_GENERIC_IRQ_H
|
|
|
|
/*
|
|
* NR_IRQS is the upper bound of how many interrupts can be handled
|
|
* in the platform. It is used to size the static irq_map array,
|
|
* so don't make it too big.
|
|
*/
|
|
#ifndef NR_IRQS
|
|
#define NR_IRQS 64
|
|
#endif
|
|
|
|
static inline int irq_canonicalize(int irq)
|
|
{
|
|
return irq;
|
|
}
|
|
|
|
#endif /* __ASM_GENERIC_IRQ_H */
|