| 273a583e | 30-Sep-2025 |
Thomas Bourgoin <thomas.bourgoin@foss.st.com> |
Squashed commit upgrading to mbedtls-3.6.4
Squash merging branch import/mbedtls-3.6.4
commit 43e97a8f0625 ("Import mbedtls-3.6.4") commit 8ac83749d343 ("mbedtls: remove default include/mbedtls/conf
Squashed commit upgrading to mbedtls-3.6.4
Squash merging branch import/mbedtls-3.6.4
commit 43e97a8f0625 ("Import mbedtls-3.6.4") commit 8ac83749d343 ("mbedtls: remove default include/mbedtls/config.h") commit 89c0fc652535 ("mbedtls: configure mbedtls to reach for config") commit 59c9730a19a8 ("libmbedtls: make mbedtls_mpi_mont*() available") commit 20d408b354b4 ("libmbedtls: add mbedtls_mpi_init_mempool()") commit ae519b65d8e1 ("libmedtls: mpi_miller_rabin: increase count limit") commit eec216feead8 ("libmbedtls: add interfaces in mbedtls for context memory operation") commit 436c9dec3733 ("libmbedtls: fix no CRT issue") commit eb7fd40aa0c1 ("libmbedtls: add SM2 curve") commit 6ca24312de58 ("libmbedtls: add fault mitigation in mbedtls_rsa_rsassa_pss_verify_ext()") commit a7a355ebd993 ("libmbedtls: add fault mitigation in mbedtls_rsa_rsassa_pkcs1_v15_verify()") commit 45083a9c2d7f ("libmbedtls: fix cipher_wrap.c for chacha20 and chachapoly") commit a345e1bb1572 ("libmbedtls: fix cipher_wrap.c for NIST AES Key Wrap mode") commit 015ba93f356d ("libmbedtls: allow inclusion of arm_neon.h") commit 3c7a228496a7 ("libmbedtls: add CFG_CORE_UNSAFE_MODEXP and CFG_TA_MBEDTLS_UNSAFE_MODEXP") commit c88a506a0f55 ("libmbedtls: use mempool_calloc() for temporary memory") commit b22584209222 ("libmbedtls: fix build warning related to deprecated DTLS connect ID") commit 4afc1eba8114 ("libmbedtls: sync with DTLS connect ID build fix") commit 85329760d40b ("libmbedtls: fix compilation warning with GCC14")
Signed-off-by: Thomas Bourgoin <thomas.bourgoin@foss.st.com> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Tested-by: Jerome Forissier <jerome.forissier@linaro.org> (vexpress-qemu_virt) Tested-by: Jerome Forissier <jerome.forissier@linaro.org> (vexpress-qemu_armv8a)
show more ...
|
| 3eb0c445 | 24-Jun-2025 |
Johan Korsnes <johan.korsnes@remarkable.no> |
libutee: Fix handling of failed TA_CreateEntryPoint() in keep-alive TAs
Do not mark init as done if init fails. This is necessary to avoid running a TA uninitialized. Also, add a new marker indicati
libutee: Fix handling of failed TA_CreateEntryPoint() in keep-alive TAs
Do not mark init as done if init fails. This is necessary to avoid running a TA uninitialized. Also, add a new marker indicating if the malloc pool and other runtime setup has been performed - this part of the init must not be repeated.
This issue could cause a NULL pointer dereference in PKCS#11 TA if the TA's init failed. F.ex., if `tee-supplicant` was unavailable, the PKCS#11 TA's `TA_CreateEntryPoint()` would fail to init its tokens, and an error value would be returned. This in itself is fine, but the problem is that the init would be marked as done. Hence, for the next session, the TA's `TA_CreateEntryPoint()` would be omitted during init.
Link: https://github.com/OP-TEE/optee_os/pull/7443 Signed-off-by: Johan Korsnes <johan.korsnes@remarkable.no> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 86d6bc20 | 11-Jul-2025 |
Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> |
libutils: disable word-at-a-time for str* functions with ASan
The optimized versions of str* functions perform word-aligned reads that may go slightly past the actual string boundary. The out-of-bou
libutils: disable word-at-a-time for str* functions with ASan
The optimized versions of str* functions perform word-aligned reads that may go slightly past the actual string boundary. The out-of-bound read accesses doesn't look dangerous, because in this case buffer start address is always word-size aligned.
Disable the optimized versions when CFG_CORE_SANITIZE_KADDRESS is enabled to avoid ASan errors.
Signed-off-by: Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 8e31dd58 | 02-Sep-2024 |
Clément Le Goffic <clement.legoffic@foss.st.com> |
core: pta: add alarm-related operations to RTC PTA
Add `set_alarm()`, `read_alarm()`, `enable_alarm()`, `wait_alarm()`, `cancel_wait()` and `set_wake_alarm_status()` operations. Also update RTC feat
core: pta: add alarm-related operations to RTC PTA
Add `set_alarm()`, `read_alarm()`, `enable_alarm()`, `wait_alarm()`, `cancel_wait()` and `set_wake_alarm_status()` operations. Also update RTC features to include alarm and wakeup alarm capabilities.
Signed-off-by: Clément Le Goffic <clement.legoffic@foss.st.com> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com> Reviewed-by: Gatien Chevallier <gatien.chevallier@foss.st.com>
show more ...
|
| 0f3e22bd | 17-Jun-2025 |
Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> |
libutils: drop redundant IS_ENABLED checks
The functions asan_tag_access() and asan_tag_heap_free() are always defined. When CFG_CORE_SANITIZE_KADDRESS is disabled, they are compiled as no-ops. Thus
libutils: drop redundant IS_ENABLED checks
The functions asan_tag_access() and asan_tag_heap_free() are always defined. When CFG_CORE_SANITIZE_KADDRESS is disabled, they are compiled as no-ops. Thus, the surrounding IS_ENABLED() checks are unnecessary and removed.
Signed-off-by: Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| ffe211e0 | 17-Jun-2025 |
Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> |
libutils: tag only actual allocated size in ASan heap tagging
Tag exactly the requested allocation size (hdr_size + requested_size) instead of the rounded-up buffer size. This ensures that ASan does
libutils: tag only actual allocated size in ASan heap tagging
Tag exactly the requested allocation size (hdr_size + requested_size) instead of the rounded-up buffer size. This ensures that ASan does not mark extra padding as valid memory.
Signed-off-by: Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 7749dda2 | 08-Jun-2025 |
Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> |
core, libutils: unpoison stack on longjmp for ASan
Adds support for unpoisoning the stack when performing longjmp, to ensure correct ASan behavior.
When a longjmp unwinds the stack, parts of the st
core, libutils: unpoison stack on longjmp for ASan
Adds support for unpoisoning the stack when performing longjmp, to ensure correct ASan behavior.
When a longjmp unwinds the stack, parts of the stack that were poisoned during deeper calls may remain marked as inaccessible. This can lead to false ASan reports after longjmp, as the new frame reuses that memory.
To avoid this, a call to asan_handle_longjmp() is added to setjmp_a64.S, which unpoisons the stack range between the current SP and the old SP (saved during setjmp).
Signed-off-by: Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 941a58d7 | 04-Apr-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
Add optee.ta.instanceKeepCrashed property
Add the optee.ta.instanceKeepCrashed property to prevent a TA with gpd.ta.instanceKeepAlive=true to be restarted. This prevents unexpected resetting of the
Add optee.ta.instanceKeepCrashed property
Add the optee.ta.instanceKeepCrashed property to prevent a TA with gpd.ta.instanceKeepAlive=true to be restarted. This prevents unexpected resetting of the state of the TA.
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Alex Lewontin <alex.lewontin@canonical.com> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 98dd4c70 | 07-Mar-2025 |
Jerome Forissier <jerome.forissier@linaro.org> |
libmbedtls: fix compilation warning with GCC14 (2)
Cherry-picking commit 7505c3588f44 ("libmbedtls: fix compilation warning with GCC14") which was lost in commit c3deb3d6f3b1 ("Squashed commit upgra
libmbedtls: fix compilation warning with GCC14 (2)
Cherry-picking commit 7505c3588f44 ("libmbedtls: fix compilation warning with GCC14") which was lost in commit c3deb3d6f3b1 ("Squashed commit upgrading to mbedtls-3.6.3"). It should have been pushed onto the import/mbedtls-3.6.2 branch when it was accepted in master but that didn't happen and therefore it was unfortunately left aside when upgrading. This time it has been applied to import/mbedtls-3.6.3 [1] so it will hopefully not be forgotten in the next upgrade.
Link: https://github.com/OP-TEE/optee_os/commit/b526c146f87 [1] Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 76d920d3 | 25-Mar-2025 |
Raymond Mao <raymond.mao@linaro.org> |
core: pta: add self tests for transfer list
Add self tests for transfer list. Adapt CFG_TRANSFER_LIST with its dependencies and add CFG_TRANSFER_LIST_TEST.
Signed-off-by: Raymond Mao <raymond.mao@l
core: pta: add self tests for transfer list
Add self tests for transfer list. Adapt CFG_TRANSFER_LIST with its dependencies and add CFG_TRANSFER_LIST_TEST.
Signed-off-by: Raymond Mao <raymond.mao@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 3a0fa646 | 28-Apr-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
libmbedtls: config: re-enable long long divisions
This reverts commit d3ec4328a070 ("libmbedtls: config: disable long long divisions") to address performance regressions introduced by that commit. T
libmbedtls: config: re-enable long long divisions
This reverts commit d3ec4328a070 ("libmbedtls: config: disable long long divisions") to address performance regressions introduced by that commit. The commit can be reverted now that __udivti3() needed by the unsigned long long divisions is available again.
Link: https://github.com/OP-TEE/optee_os/pull/7359 Link: https://github.com/OP-TEE/optee_os/issues/7374 Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 48952fd4 | 28-Apr-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
libutils: add division routines from LLVM compiler-rt
Add division routines needed to provide __udivti3() needed for long long divisions in mbedtls.
Selected files are imported from the compiler-rt
libutils: add division routines from LLVM compiler-rt
Add division routines needed to provide __udivti3() needed for long long divisions in mbedtls.
Selected files are imported from the compiler-rt directory in LLVM version 20.1.3, tag llvmorg-20.1, to lib/libutils/compiler-rt with no local changes except for the added sub.mk files.
Link: https://github.com/OP-TEE/optee_os/pull/7359 Link: https://github.com/OP-TEE/optee_os/issues/7374 Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 45c754ce | 16-Apr-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: fix crash during syscall ftrace
Syscall ftrace collects data during a syscall. get_fbuf() checks if thread_get_id_may_fail() != -1 to see if a function is called under normal thread execution.
core: fix crash during syscall ftrace
Syscall ftrace collects data during a syscall. get_fbuf() checks if thread_get_id_may_fail() != -1 to see if a function is called under normal thread execution. This can lead to an inconsistent state if a native interrupt occur while ftrace_enter() or ftrace_return() is recording data in the ftrace buffer. So fix this by using thread_is_in_normal_mode() to exclude ftrace during interrupt processing.
Reported-by: Jerome Forissier <jerome.forissier@linaro.org> Closes: https://github.com/OP-TEE/optee_os/issues/7216 Fixes: 099918f6744c ("ftrace: Add support for syscall function tracer") Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Tested-by: Jerome Forissier <jerome.forissier@linaro.org> (vexpress-qemu_armv8a)
show more ...
|
| c3deb3d6 | 28-Mar-2025 |
Etienne Carriere <etienne.carriere@foss.st.com> |
Squashed commit upgrading to mbedtls-3.6.3
Squash merging branch import/mbedtls-3.6.3.
83dd409f0591 ("Import mbedtls-3.6.3") aa3df5be08de ("mbedtls: remove default include/mbedtls/config.h") 10d3d4
Squashed commit upgrading to mbedtls-3.6.3
Squash merging branch import/mbedtls-3.6.3.
83dd409f0591 ("Import mbedtls-3.6.3") aa3df5be08de ("mbedtls: remove default include/mbedtls/config.h") 10d3d445f46f ("mbedtls: configure mbedtls to reach for config") 03fd7670bc8e ("libmbedtls: make mbedtls_mpi_mont*() available") 134b0c7c7577 ("libmbedtls: add mbedtls_mpi_init_mempool()") 84a14c2a9e2a ("libmedtls: mpi_miller_rabin: increase count limit") 5e39a372b06e ("libmbedtls: add interfaces in mbedtls for context memory operation") d5f89f104e2f ("libmbedtls: fix no CRT issue") 7efbd8164a57 ("libmbedtls: add SM2 curve") ef671e650a67 ("libmbedtls: add fault mitigation in mbedtls_rsa_rsassa_pss_verify_ext()") dd7fe0899a74 ("libmbedtls: add fault mitigation in mbedtls_rsa_rsassa_pkcs1_v15_verify()") 2ff56f350a3e ("libmbedtls: fix cipher_wrap.c for chacha20 and chachapoly") 63b52087554b ("libmbedtls: fix cipher_wrap.c for NIST AES Key Wrap mode") 1a615e16f58a ("libmbedtls: allow inclusion of arm_neon.h") 3de987540e82 ("libmbedtls: add CFG_CORE_UNSAFE_MODEXP and CFG_TA_MBEDTLS_UNSAFE_MODEXP") 878995ea5dee ("libmbedtls: use mempool_calloc() for temporary memory") 0a7b758bcd12 ("libmbedtls: fix build warning related to deprecated DTLS connect ID") e7332889098e ("libmbedtls: libmbedtls: sync with DTLS connect ID build fix")
Signed-off-by: Etienne Carriere <etienne.carriere@foss.st.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Acked-by: Jerome Forissier <jerome.forissier@linaro.org> Tested-by: Jerome Forissier <jerome.forissier@linaro.org> (vexpress-qemu_virt) Tested-by: Jerome Forissier <jerome.forissier@linaro.org> (vexpress-qemu_armv8a)
show more ...
|
| 682ff6eb | 23-Feb-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
pta: stats: add field for fragmentation metric
Add the field free2sum to struct pta_stats_alloc to enable xtest to calculate fragmenation metric for the heap.
Signed-off-by: Jens Wiklander <jens.wi
pta: stats: add field for fragmentation metric
Add the field free2sum to struct pta_stats_alloc to enable xtest to calculate fragmenation metric for the heap.
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| f288234f | 07-Mar-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
libutils: bget: add free2_sum to struct bpoolset
Add the field free2_sum to struct bpoolset to be used to calculate a metric for heap fragmentation. The value is calculated and kept up to date when
libutils: bget: add free2_sum to struct bpoolset
Add the field free2_sum to struct bpoolset to be used to calculate a metric for heap fragmentation. The value is calculated and kept up to date when compiled with statistics (CFG_WITH_STATS=y) enabled. See xtest and [1] for how to use the new field.
Link: https://asawicki.info/news_1757_a_metric_for_memory_fragmentation [1] Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 07603a1f | 01-Apr-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
libutils: avoid unneeded zero init in realloc()
In raw_malloc_flags(), remove the special case for user space where memory is always zero initialized regardless of MAF_ZERO_INIT. This removes a case
libutils: avoid unneeded zero init in realloc()
In raw_malloc_flags(), remove the special case for user space where memory is always zero initialized regardless of MAF_ZERO_INIT. This removes a case of unneeded zero init for realloc().
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 34611468 | 01-Apr-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
libutee: fix __utee_tcb_init()
Replace realloc() calls with calls to malloc_flags() to make sure that newly allocated memory is zero initialized.
Fixes: 9d224046e710 ("ldelf, libutee: add minimal T
libutee: fix __utee_tcb_init()
Replace realloc() calls with calls to malloc_flags() to make sure that newly allocated memory is zero initialized.
Fixes: 9d224046e710 ("ldelf, libutee: add minimal Thread Local Storage support") Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 93b037ac | 01-Apr-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
libutee: TEE_Realloc(): avoid realloc()
TEE_Realloc() and realloc() have slightly different behaviour. TEE_Realloc() must zero initialize newly allocated memory while realloc() isn't expected to do
libutee: TEE_Realloc(): avoid realloc()
TEE_Realloc() and realloc() have slightly different behaviour. TEE_Realloc() must zero initialize newly allocated memory while realloc() isn't expected to do that. So use malloc_flags() and raw_malloc_flags() with the MAF_ZERO_INIT flag to make sure that newly allocated memory is zero initialized.
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| b13e4076 | 01-Apr-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
libutils: add raw_malloc_flags()
Add raw_malloc_flags() as a counterpart to malloc_flags().
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier
libutils: add raw_malloc_flags()
Add raw_malloc_flags() as a counterpart to malloc_flags().
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| fa1190c6 | 20-Feb-2025 |
Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> |
core: suppress duplicate ubsan reports
When ubsan panic mode is disabled, the same undefined behavior may be reported multiple times from the same code location. This change ensures that only the fi
core: suppress duplicate ubsan reports
When ubsan panic mode is disabled, the same undefined behavior may be reported multiple times from the same code location. This change ensures that only the first occurrence is logged.
Signed-off-by: Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| 949b0c0c | 15-Jan-2025 |
Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> |
ta: enable ubsan support for TAs
Introduce CFG_TA_SANITIZE_UNDEFINED config to sanitize trusted applications. If CFG_TA_SANITIZE_UNDEFINED is set sanitize flags are propagated to internal TAs (avb,
ta: enable ubsan support for TAs
Introduce CFG_TA_SANITIZE_UNDEFINED config to sanitize trusted applications. If CFG_TA_SANITIZE_UNDEFINED is set sanitize flags are propagated to internal TAs (avb, pkcs11, remoteproc, trusted_keys) and external TAs, which are built with the devkit.
Signed-off-by: Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| ff3ed644 | 15-Jan-2025 |
Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> |
ldelf: enable ubsan support
Ubsan support was previously limited to core code. This commit moves the ubsan runtime implementation to libutils, making it available for ldelf and trusted applications.
ldelf: enable ubsan support
Ubsan support was previously limited to core code. This commit moves the ubsan runtime implementation to libutils, making it available for ldelf and trusted applications.
As a result, ldelf will now be built with ubsan support when CFG_CORE_SANITIZE_UNDEFINED is enabled.
Additionally, to avoid potential infinite recursion, ubsan instrumentation is explicitly disabled for ubsan.c.
Signed-off-by: Aleksandr Iashchenko <aleksandr.iashchenko@linutronix.de> Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|
| e1abe7d1 | 20-Mar-2025 |
Alvin Chang <alvinga@andestech.com> |
libmbedtls: fix typo: CFG_TA_MEBDTLS_UNSAFE_MODEXP
CFG_TA_"MEBDTLS"_UNSAFE_MODEXP is typo. This commit fixes it.
Fixes: cb03400251f9 ("Squashed commit upgrading to mbedtls-3.6.2") Signed-off-by: Al
libmbedtls: fix typo: CFG_TA_MEBDTLS_UNSAFE_MODEXP
CFG_TA_"MEBDTLS"_UNSAFE_MODEXP is typo. This commit fixes it.
Fixes: cb03400251f9 ("Squashed commit upgrading to mbedtls-3.6.2") Signed-off-by: Alvin Chang <alvinga@andestech.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 809e0744 | 26-Feb-2025 |
Jens Wiklander <jens.wiklander@linaro.org> |
core: mm: add virt_page_alloc()
Add virt_page_alloc() to allocate memory from physical pool and map it in a virtual address pool.
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-
core: mm: add virt_page_alloc()
Add virt_page_alloc() to allocate memory from physical pool and map it in a virtual address pool.
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@foss.st.com>
show more ...
|