sandbox: Drop use of special os_malloc() where possible
authorSimon Glass <sjg@chromium.org>
Mon, 3 Feb 2020 14:36:02 +0000 (07:36 -0700)
committerSimon Glass <sjg@chromium.org>
Thu, 6 Feb 2020 02:33:46 +0000 (19:33 -0700)
commit0db1b4305ad5ba8ef9c41d2f07697c77a04787e2
treeeb3d8985ed675c8ee220d4b001c43215575b44f2
parentf72bdc60b230f5e5d77eaad0b2defe07a46c02a9
sandbox: Drop use of special os_malloc() where possible

Some sandbox files are not built with U-Boot headers, so with the renamed
malloc functions there is now no need to use the special os_... allocation
functions to access the system routines. Instead we can just call them
directly.

Update the affected files accordingly.

Signed-off-by: Simon Glass <sjg@chromium.org>
arch/sandbox/cpu/eth-raw-os.c
arch/sandbox/cpu/os.c