Enumerations

enum InOutPolicy
Name Value
kIn 1
kOut 2
kInOut kIn | kOut

Defined at line 27 of file ../../zircon/kernel/lib/user_copy/include/lib/user_copy/user_ptr.h

enum BrwLockEnablePi
Name Value
No false
Yes true

Defined at line 29 of file ../../zircon/kernel/include/kernel/brwlock.h

Records

Functions

  • void validate_user_accessible_range (vaddr_t * vaddr, size_t * len)

    Ensure that addresses in the range [vaddr, vaddr+len) are accessible to the user. If any address

    in this range is not accessible to the user, `vaddr` and `len` are set to {0,0}.

    So you might wonder why we don't simply implement this function using `is_user_accessible_range`?

    That's because we need to avoid introducing any conditional branches. The purpose of

    `validate_user_accessible_range` is to mitigate Spectre V1 attacks (Bounds Check Bypass) which

    rely on speculative execution of conditional branches.

    Defined at line 23 of file ../../zircon/kernel/lib/user_copy/internal.cc

  • zbi_mem_range_t ToMemRange (const E820Entry & range)

    Defined at line 75 of file ../../zircon/kernel/arch/x86/phys/boot-shim/legacy-mem-config.cc

  • zbi_mem_range_t ToMemRange (const efi_memory_descriptor & range)

    Defined at line 85 of file ../../zircon/kernel/arch/x86/phys/boot-shim/legacy-mem-config.cc

  • ::lockdep::AmbiguousOption LOCK_DEP_GetLockPolicyType (BrwLockPi * , void * )

    Configure fbl::Guard

    <BrwLockPi

    , BrwLockPi::Reader> read locks through the given policy.

  • BrwLockPi::WriterPolicy LOCK_DEP_GetLockPolicyType (BrwLockPi * , BrwLockPi::Writer * )

    Configure fbl::Guard

    <BrwLockPi

    , BrwLockPi::Writer> write locks through the given policy.

  • BrwLockPi::ReaderPolicy LOCK_DEP_GetLockPolicyType (BrwLockPi * , BrwLockPi::Reader * )

    Configure fbl::Guard

    <BrwLockPi

    , BrwLockPi::Reader> read locks through the given policy.

  • ::lockdep::AmbiguousOption LOCK_DEP_GetLockPolicyType (BrwLockNoPi * , void * )

    Configure fbl::Guard

    <BrwLockNoPi

    , BrwLockNoPi::Reader> read locks through the given policy.

  • BrwLockNoPi::WriterPolicy LOCK_DEP_GetLockPolicyType (BrwLockNoPi * , BrwLockNoPi::Writer * )

    Configure fbl::Guard

    <BrwLockNoPi

    , BrwLockNoPi::Writer> write locks through the given policy.

  • BrwLockNoPi::ReaderPolicy LOCK_DEP_GetLockPolicyType (BrwLockNoPi * , BrwLockNoPi::Reader * )

    Configure fbl::Guard

    <BrwLockNoPi

    , BrwLockNoPi::Reader> read locks through the given policy.

  • ::testing::Matcher<int> SpecificErrno (const int expected)

    Defined at line 141 of file ../../src/starnix/tests/syscalls/cpp/syscall_matchers.h

Variables

ktl::atomic<zx_ticks_t> mono_ticks_modifier

Defined at line 32 of file ../../zircon/kernel/include/platform/timer.h

const uint64_t kTicksOopsThreshold

Defined at line 42 of file ../../zircon/kernel/include/platform/timer.h

ktl::atomic<uint64_t> boot_ticks_offset

Defined at line 48 of file ../../zircon/kernel/include/platform/timer.h

const WeightTableEntry[32] kPriorityToWeightTable

Defined at line 125 of file ../../zircon/kernel/include/kernel/scheduler_state.h