Skip to content

reconsider k_mem_pool APIs #3767

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
zephyrbot opened this issue Jun 28, 2017 · 0 comments
Closed

reconsider k_mem_pool APIs #3767

zephyrbot opened this issue Jun 28, 2017 · 0 comments
Labels
area: API Changes to public APIs area: Kernel Enhancement Changes/Updates/Additions to existing features

Comments

@zephyrbot
Copy link
Collaborator

zephyrbot commented Jun 28, 2017

Reported by Andrew Boie:

Currently, k_mem_pool works with k_mem_block objects. These k_mem_block objects have a pointer to the memory blob plus some kernel bookkeeping information in the embedded struct k_mem_block_id. We do not want malfeasance with k_mem_block_id to be able to mess up the kernel.

Ideally, the entire mem_pool APIs would be usable from userspace without any privilege elevation, and only k_malloc() and k_free() however, irq_lock()/unlock() calls in the code confound this.

Determine how to best adapt memory pool APIs in a system with user/supervisor threads.

(Imported from Jira ZEP-2333)

@zephyrbot zephyrbot added area: Kernel Enhancement Changes/Updates/Additions to existing features labels Sep 23, 2017
@zephyrbot zephyrbot added this to the v1.11.0 milestone Sep 23, 2017
@carlescufi carlescufi modified the milestones: v1.11.0, v1.12.0 Mar 9, 2018
@nashif nashif removed this from the v1.12.0 milestone Sep 5, 2018
@galak galak added the area: API Changes to public APIs label Apr 30, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area: API Changes to public APIs area: Kernel Enhancement Changes/Updates/Additions to existing features
Projects
None yet
Development

No branches or pull requests

5 participants