Enumerations
enum InOutPolicy
| Name | Value |
|---|---|
| kIn | 1 |
| kOut | 2 |
| kInOut | kIn | kOut |
Defined at line 27 of file ../../zircon/kernel/lib/user_copy/include/lib/user_copy/user_ptr.h
enum BrwLockEnablePi
| Name | Value |
|---|---|
| No | false |
| Yes | true |
Defined at line 29 of file ../../zircon/kernel/include/kernel/brwlock.h
Records
-
class AnySuccessValueMatcher -
class BlockOpLockDetails -
class BlockOpLockDetails -
class BlockOpLockDetails -
class BrwLock -
class BrwLock -
class BrwLock -
class BrwLockState -
class BrwLockState -
class BrwLockState -
class BrwLockWaitQueueType -
class BrwLockWaitQueueType -
class BrwLockWaitQueueType -
class CacheLineFlusher -
class ChildListTag -
class DiscardableListTag -
class EfiTable -
class FuchsiaKernelOsal -
class GlobalListTag -
class JobDispatcherListTag -
class JobDispatcherRawListTag -
class MemberAccess -
class MemberAccess -
class MessagePacketDeleter -
class PendingTlbInvalidation -
class PmmArenaSelector -
class ProcessDispatcherJobListTag -
class ProcessDispatcherRawJobListTag -
class SafeCastImpl -
class SafeCastImpl -
class SafeCastImpl -
class SpecificErrnoMatcher -
class SyscallFailureMatcher -
class SyscallSuccessMatcher -
class VmObjectTypeTag -
class VmObjectTypeTag -
class VmObjectTypeTag -
class WakeOpHooks -
class WeightTableEntry -
class is_copy_allowed -
class user_iovec -
class user_ptr
Functions
-
void validate_user_accessible_range (vaddr_t * vaddr, size_t * len)Ensure that addresses in the range [vaddr, vaddr+len) are accessible to the user. If any address
in this range is not accessible to the user, `vaddr` and `len` are set to {0,0}.
So you might wonder why we don't simply implement this function using `is_user_accessible_range`?
That's because we need to avoid introducing any conditional branches. The purpose of
`validate_user_accessible_range` is to mitigate Spectre V1 attacks (Bounds Check Bypass) which
rely on speculative execution of conditional branches.
Defined at line 23 of file ../../zircon/kernel/lib/user_copy/internal.cc
-
zbi_mem_range_t ToMemRange (const E820Entry & range)Defined at line 75 of file ../../zircon/kernel/arch/x86/phys/boot-shim/legacy-mem-config.cc
-
zbi_mem_range_t ToMemRange (const efi_memory_descriptor & range)Defined at line 85 of file ../../zircon/kernel/arch/x86/phys/boot-shim/legacy-mem-config.cc
-
::lockdep::AmbiguousOption LOCK_DEP_GetLockPolicyType (BrwLockPi * , void * )Configure fbl::Guard
<BrwLockPi
, BrwLockPi::Reader> read locks through the given policy.
-
BrwLockPi::WriterPolicy LOCK_DEP_GetLockPolicyType (BrwLockPi * , BrwLockPi::Writer * )Configure fbl::Guard
<BrwLockPi
, BrwLockPi::Writer> write locks through the given policy.
-
BrwLockPi::ReaderPolicy LOCK_DEP_GetLockPolicyType (BrwLockPi * , BrwLockPi::Reader * )Configure fbl::Guard
<BrwLockPi
, BrwLockPi::Reader> read locks through the given policy.
-
::lockdep::AmbiguousOption LOCK_DEP_GetLockPolicyType (BrwLockNoPi * , void * )Configure fbl::Guard
<BrwLockNoPi
, BrwLockNoPi::Reader> read locks through the given policy.
-
BrwLockNoPi::WriterPolicy LOCK_DEP_GetLockPolicyType (BrwLockNoPi * , BrwLockNoPi::Writer * )Configure fbl::Guard
<BrwLockNoPi
, BrwLockNoPi::Writer> write locks through the given policy.
-
BrwLockNoPi::ReaderPolicy LOCK_DEP_GetLockPolicyType (BrwLockNoPi * , BrwLockNoPi::Reader * )Configure fbl::Guard
<BrwLockNoPi
, BrwLockNoPi::Reader> read locks through the given policy.
-
::testing::Matcher<int> SpecificErrno (const int expected)Defined at line 141 of file ../../src/starnix/tests/syscalls/cpp/syscall_matchers.h
Variables
ktl::atomic<zx_ticks_t> mono_ticks_modifier
Defined at line 32 of file ../../zircon/kernel/include/platform/timer.h
const uint64_t kTicksOopsThreshold
Defined at line 42 of file ../../zircon/kernel/include/platform/timer.h
ktl::atomic<uint64_t> boot_ticks_offset
Defined at line 48 of file ../../zircon/kernel/include/platform/timer.h
const WeightTableEntry[32] kPriorityToWeightTable
Defined at line 125 of file ../../zircon/kernel/include/kernel/scheduler_state.h