mirror of
https://github.com/Qortal/Brooklyn.git
synced 2025-02-07 06:44:18 +00:00
2a709f28fa
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
29 lines
700 B
C
29 lines
700 B
C
#ifndef __ASM_GENERIC_SYSCALLS_H
|
|
#define __ASM_GENERIC_SYSCALLS_H
|
|
|
|
#include <linux/compiler.h>
|
|
#include <linux/linkage.h>
|
|
|
|
/*
|
|
* Calling conventions for these system calls can differ, so
|
|
* it's possible to override them.
|
|
*/
|
|
|
|
#ifndef sys_mmap2
|
|
asmlinkage long sys_mmap2(unsigned long addr, unsigned long len,
|
|
unsigned long prot, unsigned long flags,
|
|
unsigned long fd, unsigned long pgoff);
|
|
#endif
|
|
|
|
#ifndef sys_mmap
|
|
asmlinkage long sys_mmap(unsigned long addr, unsigned long len,
|
|
unsigned long prot, unsigned long flags,
|
|
unsigned long fd, off_t pgoff);
|
|
#endif
|
|
|
|
#ifndef sys_rt_sigreturn
|
|
asmlinkage long sys_rt_sigreturn(struct pt_regs *regs);
|
|
#endif
|
|
|
|
#endif /* __ASM_GENERIC_SYSCALLS_H */
|