Commit Graph

19697 Commits

Author SHA1 Message Date
KonstantinKondrashov
63a755e8b2 bootloader_support: Fix iram_loader_seg overflow for ESP32-S2 when -O0 2023-03-02 19:52:17 +08:00
KonstantinKondrashov
79659a0410 chip_version: Updates for Make build system 2023-03-02 19:52:17 +08:00
Chen Yudong
dee43d284e example: fix got ip error in protocol tests 2023-03-02 11:33:07 +00:00
Chen Yudong
db940f30bc CI: optimize example protocol test cases 2023-03-02 11:33:07 +00:00
KonstantinKondrashov
e88f235326 all: Apply new version logic (major * 100 + minor) 2023-03-02 03:21:34 +00:00
Jiang Jiang Jian
2b04fa8059 Merge branch 'bugfix/fix_sta_auth_fail_but_softap_shows_it_connected_issue_v4.3' into 'release/v4.3'
esp_wifi: fix sta auth failed but softap shows it connected issue(Backport v4.3)

See merge request espressif/esp-idf!22512
2023-03-01 15:45:41 +08:00
Jiang Jiang Jian
2e1c1a3292 Merge branch 'fix/gdbgui_v4.3' into 'release/v4.3'
Tools: gdbgui is not supported on Python 3.11 (v4.3)

See merge request espressif/esp-idf!22548
2023-03-01 10:47:47 +08:00
Jiang Jiang Jian
dfc8c67ec0 Merge branch 'bugfix/fix_some_ble_bug_v4.3' into 'release/v4.3'
Fixed some BLE bugs (backport v4.3)

See merge request espressif/esp-idf!22365
2023-03-01 10:46:00 +08:00
Roland Dobai
f9e5272727 Tools: gdbgui is not supported on Python 3.11
Closes https://github.com/espressif/esp-idf/issues/10116
2023-02-28 16:04:16 +01:00
muhaidong
f28a7853d3 esp_wifi: fix sta failed but softap shows it connected issue 2023-02-28 09:12:02 +00:00
chenjianhua
1e126817e6 examples: fix ble address type of adv and scan params 2023-02-28 09:11:40 +00:00
chenjianhua
156f40c976 bluedroid: support ble privacy by controller 2023-02-28 09:11:40 +00:00
chenjianhua
8790931bab bluedroid: add params in GATT connect event 2023-02-28 09:11:40 +00:00
chenjianhua
25394b6ac4 update bt-lib for ESP32
fix ble disconnect due to channel map update instant passed
2023-02-28 09:11:40 +00:00
Jiang Jiang Jian
d4253e703f Merge branch 'fix/heap-iram-to-flash-call' into 'release/v4.3'
heap: Fix call to substract_poison_overhead() in IRAM function

See merge request espressif/esp-idf!22525
2023-02-28 17:10:57 +08:00
Guillaume Souchere
7e6f20218b heap: Fix call to substract_poison_overhead() in IRAM function
When release sdkconfig is set, substract_poison_overhead() is not inlined
and called from IRAM in multi_heap_get_allocated_size(). By wlways inlining
substract_poison_overhead(), we assure that this problem will not happen.
2023-02-27 06:57:36 +01:00
Jiang Jiang Jian
e214989c58 Merge branch 'docs/fix_errors_in_esp32-c3-devkitm-1_pin_list_v4.3' into 'release/v4.3'
Docs/Fix Errors in ESP32-C3-DevKitM-1 Pin List (v4.3)

See merge request espressif/esp-idf!22496
2023-02-26 15:53:02 +08:00
Jiang Jiang Jian
ba4b47d24e Merge branch 'bugfix/secure_boot_v2_part_size_check_make_build' into 'release/v4.3'
partition_table: update make build for new "--secure [v1/v2]" argument

See merge request espressif/esp-idf!22437
2023-02-26 15:52:11 +08:00
Jiang Jiang Jian
1f739d7185 Merge branch 'bugfix/blufi_notify_v4.3' into 'release/v4.3'
BluFi : Fixed hdr getting free twice (v4.3)

See merge request espressif/esp-idf!22450
2023-02-26 15:51:54 +08:00
Jiang Jiang Jian
690b971f99 Merge branch 'feature/tlsf-dynamic-control-size_v4.3' into 'release/v4.3'
heap: Update tlsf to use dynamic metadata size and lower RAM usage of heap component (backport v4.3)

See merge request espressif/esp-idf!21783
2023-02-26 15:51:45 +08:00
Jiang Jiang Jian
043958e39f Merge branch 'bugfix/fix_gpio_wakeup_related_issues_in_ssc_sleep_test_backport_v4.3' into 'release/v4.3'
sleep: fix gpio wakeup related issues(backport v4.3)

See merge request espressif/esp-idf!22334
2023-02-26 15:51:29 +08:00
Jiang Jiang Jian
6f5e6b3841 Merge branch 'feature/add_bootloader_sector_pad_option_v4.3' into 'release/v4.3'
esptool_py: Added a --pad-to-size flag to align the bootloader image (v4.3)

See merge request espressif/esp-idf!22328
2023-02-26 15:51:09 +08:00
Jiang Jiang Jian
24aa00d99d Merge branch 'fix/heap-get-allocated-size_v4.3' into 'release/v4.3'
heap: Fix erroneous value returned by heap_caps_get_allocated_size() when poisoning is enabled (backport v4.3)

See merge request espressif/esp-idf!22190
2023-02-26 15:50:54 +08:00
Jiang Jiang Jian
3a4755e547 Merge branch 'bugfix/build_err_with_ssr_enabled_v4.3' into 'release/v4.3'
bt: Fixed build errors when sniff subrating is enabled (v4.3)

See merge request espressif/esp-idf!22352
2023-02-26 15:50:11 +08:00
Jiang Jiang Jian
fcf33944cd Merge branch 'bugfix/clear_pmk_cache_for_missing_reason_codes_v4.3' into 'release/v4.3'
Fix missing disconnected callback (Backport v4.3)

See merge request espressif/esp-idf!22518
2023-02-26 15:49:59 +08:00
Shyamal Khachane
179fc63526 esp_wifi: Fix missing disconnected callback 2023-02-24 18:44:28 +05:30
Darian Leung
1f6d7fa334 twai: Add errata workaround for listen only mode
This commit adds a workaround for the TWAI listen only mode errata which is
present on the ESP32, ESP32-S2, ESP32-S3, and ESP32-C3. twai_get_status_info()
has also been updated to account for the fact that TEC/REC are frozen in
listen only mode.

Errata Description:

When the TWAI controller is put into listen only mode, it should not influence
the TWAI bus in any way (i.e., should never send a dominant bit). However,
on the targets listed above, the TWAI controller will send dominant bits in an
error frame (i.e., active error frame), even if the controller is set to listen
only mode.

Workaround:

We can force the TWAI controller into the error passive state on startup (by
setting the REC to >= 128). Since the TEC/REC are frozen in listen only mode,
the TWAI controller will remain error passive and only send recessive bits
(i.e., passive error frames), thus will not influence the TWAI bus.

Closes https://github.com/espressif/esp-idf/issues/9157
2023-02-24 20:40:33 +08:00
Wang Ning
470b7e0ad0 docs/fix_errors_in_esp32-c3-devkitm-1_pin_list 2023-02-23 15:19:27 +08:00
Guillaume Souchere
a82cf0b00c heap: Fix erroneous value returned by heap_caps_get_allocated_size() when poisoning is enabled
When light (or comprehensive) poisoning is enabled, the size requested by the user for allocation
is extended by a few bytes to store the canary header and footer. heap_caps_get_allocated_size() should
return the original size asked by the user (without the additional canary bytes).

test_malloc.c extended with a new test assuring that  heap_caps_get_allocated_size() returns the proper size
regardless of the degree of poisoning.
2023-02-22 10:45:00 +00:00
isha.pardikar@espressif.com
9c0ad412ed BluFi : Fixed hdr getting free twice
Closes IDFGH-9378
2023-02-21 11:47:39 +05:30
Mahavir Jain
62e58ba624
partition_table: fix make build for new "--secure [v1/v2]" argument 2023-02-20 17:05:35 +05:30
Guillaume Souchere
73fca2c851 esp_system: fix placement of __stack_chk_fail from flash to RAM
When stack check is enabled, certain functions (sometimes placed in RAM)
are being decorated with stack guards and a call to __stask_chk_fail() in
case ofr stack corruption. For this reason, __stack_chk_fail() must be
placed in RAM too.

Add stack check config in heap tests on all targets to find eventual flash to RAM
calls due to stack checks when running callgraph_check.py
2023-02-16 08:48:00 +00:00
Guillaume Souchere
dbc4572814 heap: fix linker issues and remove spi flash dependencies 2023-02-16 08:48:00 +00:00
Guillaume Souchere
9b51759e8f feat: remove tlsf_fls and tlsf_ffs from linker as they are inlined. 2023-02-16 08:48:00 +00:00
Guillaume Souchere
f5e3585a9c tools: update list of references to not include symbold used by __assert_func calls
On xtensa architecture, the call to __assert_func uses a reference to __func__ that can
sometimes be placed in flash. Since the __asert_func can be called from functions in IRAM
the check_callgraph script can report an error when checking for invalid calls from IRAM
to flash sections. However, the __asert_func prevents this scenario at runtime so the
check_callgraph script reports a 'flas positive' situation. For this reasson, all references
to __func__$x found prior to a call to __assert_func are droped in the parsing of the rtl files.
2023-02-16 08:48:00 +00:00
Guillaume Souchere
598e77e287 heap: add check for usage of flash content from iram
this commits:
- adds build-time test to check that no call to flash regions are done from IRAM functions

- resolves problems related to IRAM function using content in flash memory

- update heap_caps_alloc_failed to use a default function name in DRAM
  when necessary instead of creating a function name variable in DRAM for
  each call of heap_caps_alloc_failed. This allows to save some extra bytes
  in RAM.
2023-02-16 08:48:00 +00:00
Guillaume Souchere
5f735a22ec heap: add documentation about the function placement in IRAM and its usage in ISR
This commits adds a internal.md file in the heap directory to clarify the idea behind
which functions is placed in IRAM or in flash.

A section in mem_alloc.rst documentation is added to specify which functions from the
heap component API can be used in interrupt handlers.
2023-02-16 08:48:00 +00:00
Guillaume Souchere
8700bdc156 heap: add selective placement of function in IRAM
This commit aims to place in the IRAM section only the functions that
are relevent for performance instead of placing the entire content of
multi_heap.c, mullti_heap_poisoning.c and tlsf.c in the IRAM.
2023-02-16 08:48:00 +00:00
Guillaume Souchere
7ce0620d32 heap: Update host tests after incorporation of the new TLSF implementation 2023-02-16 08:48:00 +00:00
Guillaume Souchere
48b0000e22 heap: update the calculation of fl index max and use bitfield in control_t
The calculation of fl index max is changed to always be the smallest
number that includes the size of the registered memory.

The control_construct() function now checks for minimum size as the control structure
parameters are calculated.

There is no longer a minimum configuration for fl index max so the tlsf_config
enum is striped down to remove unecessary compile time values.

the tlsf_size() function will fail if no tlsf pointer is passed as parameter since there
is no way to calculate a default tlsf size anymore.

bitfields are now used in control_t when possible which reduces the size of the structure
from 56 bytes to 36 bytes.
2023-02-16 08:48:00 +00:00
Guillaume Souchere
9f6b549dea Revert "tlsf control's structure should remain opaque"
This reverts commit 7010314c4a.
2023-02-16 08:48:00 +00:00
Philippe
6a3f3e9421 add host test with multiple heap size 2023-02-16 08:48:00 +00:00
Philippe
30bd908f97 clarify parameter usage in tslf_create 2023-02-16 08:48:00 +00:00
Philippe
a7b9e7a8bd tlsf control's structure should remain opaque 2023-02-16 08:48:00 +00:00
Philippe
e45d350b97 dynamic control block per heap 2023-02-16 08:48:00 +00:00
harshal.patil
4e77c32afc esptool_py: Added a sector-pad option for bootloader image
When SECURE BOOT V2 is enabled and CONFIG_SECURE_BOOT_SIGNED_BINARIES
is not set, sector-pad the bootloader image, which is required for an
external PKCS#11 interface to generate a signature.

esptool_py: Update submodule to release/v3 (4bc311767b7c6df41def6f95a50f87b1c9406cbd)
2023-02-15 16:10:31 +05:30
jingli
805db259b7 sleep: fix gpio wakeup not working properly in some cases
Before this fix, when we call esp_pm_configure after gpio_wakeup_enable,
the configuration of GPIO in sleep state in gpio_wakeup_enable will be
overwritten by esp_pm_configure.
2023-02-13 19:54:17 +08:00
jingli
f556ac1b92 soc_caps: remove SOC_GPIO_SUPPORT_SLP_SWITCH
all esp chips support this feature
2023-02-13 19:54:11 +08:00
Jin Cheng
7fc5d19730 Fixed build errors when sniff subrating is enabled. 2023-02-13 17:28:15 +08:00
Jiang Jiang Jian
ea8de4ddca Merge branch 'feature/efuse_rev_major_minor_v4.3' into 'release/v4.3'
efuse: Adds major and minor versions (v4.3)

See merge request espressif/esp-idf!19544
2023-02-11 20:01:59 +08:00