forked from Qortal/Brooklyn
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
16 lines
516 B
C
16 lines
516 B
C
#ifndef _UAPI__ASM_GENERIC_BITS_PER_LONG
|
|
#define _UAPI__ASM_GENERIC_BITS_PER_LONG
|
|
|
|
/*
|
|
* There seems to be no way of detecting this automatically from user
|
|
* space, so 64 bit architectures should override this in their
|
|
* bitsperlong.h. In particular, an architecture that supports
|
|
* both 32 and 64 bit user space must not rely on CONFIG_64BIT
|
|
* to decide it, but rather check a compiler provided macro.
|
|
*/
|
|
#ifndef __BITS_PER_LONG
|
|
#define __BITS_PER_LONG 32
|
|
#endif
|
|
|
|
#endif /* _UAPI__ASM_GENERIC_BITS_PER_LONG */
|