mirror of
https://github.com/Qortal/Brooklyn.git
synced 2025-02-15 03:35:55 +00:00
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
15 lines
397 B
C
15 lines
397 B
C
|
|
#include <linux/hardirq.h>
|
|
|
|
/*
|
|
* may_use_simd - whether it is allowable at this time to issue SIMD
|
|
* instructions or access the SIMD register file
|
|
*
|
|
* As architectures typically don't preserve the SIMD register file when
|
|
* taking an interrupt, !in_interrupt() should be a reasonable default.
|
|
*/
|
|
static __must_check inline bool may_use_simd(void)
|
|
{
|
|
return !in_interrupt();
|
|
}
|