David Cermak
65917bb8c3
fix(esp_netif): Lock netif list with TCPIP context
...
This commit removes the lock from the list manipulation code in esp_netif_objects.c,
because we already have another lock/task context for lwip.
So the list manipulation is unsafe and safety must be assured by the stack layer
(in esp_netif_lwip).
Problems with current locking:
* implementation of locking was wrong -- lazy init style of creating the mutex is not
thread safe (and destroying it if we have no interface makes the problem exhibit very frequently)
* locking only the list won't solve issues when assessing interfaces atomically
* maintaining multiple locks is problematic, as we often switch between
lwip context and user context in internal implementation of esp_netif_lwip
Closes https://github.com/espressif/esp-idf/issues/12261
2023-11-22 09:59:37 +00:00
Jiang Jiang Jian
2cc61caf7b
Merge branch 'bugfix/add_par_check_in_ag_cind_res_v5.1' into 'release/v5.1'
...
Bugfix/add par check in ag cind res v5.1
See merge request espressif/esp-idf!27257
2023-11-22 17:47:28 +08:00
Jiang Jiang Jian
d5e87fed74
Merge branch 'bugfix/spp_deinit_crash_v5.1' into 'release/v5.1'
...
fix(bt/bluedroid): Fix the crash of invalid access to released resources (v5.1)
See merge request espressif/esp-idf!27251
2023-11-22 17:45:48 +08:00
Jiang Jiang Jian
8b6977b883
Merge branch 'bugfix/coex_cfg_option_invisible_v5.1' into 'release/v5.1'
...
fix(esp_coex): Fix dependency errors in coexist configuration (Backport v5.1)
See merge request espressif/esp-idf!26577
2023-11-22 17:45:05 +08:00
Jiang Jiang Jian
b09e1d860d
Merge branch 'bugfix/fix_psram_access_faild_after_pd_cpu_wakeup_v5.1' into 'release/v5.1'
...
fix(esp_pm): fix psram access failed after pd_cpu wakeup if uart driver driven console is used (backport v5.1)
See merge request espressif/esp-idf!27051
2023-11-22 17:44:32 +08:00
zwx
f710a49680
feat(docs) Add RF Coexist docs for H2
2023-11-22 17:04:55 +08:00
darshan
8dcd59f34f
feat(nimble): Added API to retrieve the size of the controller's white list (v5.1)
2023-11-22 10:29:36 +05:30
Shu Chen
ecbbd3c3d9
Merge branch 'backport/add_ot_radio_stats_enable_config_5_1' into 'release/v5.1'
...
feat(openthread): backport some openthread features(BackportV5.1)
See merge request espressif/esp-idf!26885
2023-11-22 12:23:53 +08:00
Rahul Tank
3662303f31
Merge branch 'bugfix/generate_new_irk_across_reboot_v5.1' into 'release/v5.1'
...
fix(nimble): Generate a new unique IRK for every chip. (v5.1)
See merge request espressif/esp-idf!27117
2023-11-22 03:03:39 +08:00
Ivan Grokhotkov
6481b0161c
ci: add build test for CONFIG_ESP_CONSOLE_USB_CDC_SUPPORT_ETS_PRINTF
2023-11-21 17:33:30 +01:00
Ivan Grokhotkov
e2f1327a5c
examples: re-enable system/console/advanced_usb_cdc for ESP32-S3
...
Closes https://github.com/espressif/esp-idf/issues/9364
2023-11-21 17:33:30 +01:00
Ivan Grokhotkov
6ec4937cec
esp_system: usb_console support for ESP32-S3
...
Closes https://github.com/espressif/esp-idf/issues/8879
Closes https://github.com/espressif/esp-idf/issues/8738
2023-11-21 17:33:30 +01:00
Ivan Grokhotkov
22dd730a7c
esp_rom: convert USB related headers to SPDX, update COPYRIGHTS.rst
2023-11-21 17:33:30 +01:00
Ivan Grokhotkov
6d1f573945
esp_rom: implement usb deinit functions added in S3 ROM for S2
...
This cleans up usb_console.c and prepares it for S3 support.
2023-11-21 17:33:29 +01:00
Ivan Grokhotkov
228dbe103f
esp_rom: add USB_OTG "port" number for S2 and S3
2023-11-21 17:33:29 +01:00
Ivan Grokhotkov
c7b409aa94
esp_rom: sync changes for ESP32-S3 USB related files, minor fix for S2
...
Used esp-rom tag esp32s3-20210327 and did manual cleanup.
Rename s_usb_osglue to rom_usb_osglue like it was done for esp32s2.
Some comments in esp32s2 headers are synced from esp32s3.
2023-11-21 17:33:29 +01:00
Ivan Grokhotkov
2c341a8557
console: minor fixes
...
- wrong comment
- duplicated setvbuf
2023-11-21 17:33:29 +01:00
sonika.rathi
633a3b06db
fix(vfs/uart): add UART VFS select callback in IRAM
...
UART VFS select callback is placed in IRAM when CONFIG_UART_ISR_IN_IRAM is enabled
2023-11-21 14:17:08 +01:00
luomanruo
d24f7d9f12
ble(fix): deinit crash issue
2023-11-21 15:05:22 +08:00
zwl
9cf6280eea
fix(ble): fixed ble occasional rx exception issue
2023-11-21 15:03:38 +08:00
luomanruo
2cf6c185dc
ci(ble/bluedroid): Add notes in sdkconfig.defaults
2023-11-21 15:03:38 +08:00
luomanruo
11f26f3319
ble: update controller log module
2023-11-21 15:03:38 +08:00
luomanruo
fcc8ce5de5
ble: update c6 h2 lib to 5b1dfd2b, c2 lib to db4e1fb2
2023-11-21 15:03:38 +08:00
luomanruo
2984e14eba
ble(fix): Fixed the issue of not returning memory to the memory pool after deinit callout
...
ble(fix): Fixed the issue of not returning memory to the memory pool after deinit callout
2023-11-21 15:03:38 +08:00
Rahul Tank
9571780d5e
ci(nimble): Cleanup sdkconfig files for nimble examples
2023-11-21 12:23:06 +05:30
Aditya Patwardhan
514cd783a3
Merge branch 'bugfix/esp32h2_ecdsa_hardware_k_v5.1' into 'release/v5.1'
...
fix(esp32h2): program use_hardware_k efuse bit for ECDSA key purpose (v5.1)
See merge request espressif/esp-idf!27271
2023-11-21 13:57:38 +08:00
Rahul Tank
6965a11570
fix(nimble): Generate a new unique Local IRK for each chip
2023-11-21 10:23:42 +05:30
Rahul Tank
4d88e7b9a7
Merge branch 'bugfix/remove_bond_v5.1' into 'release/v5.1'
...
fix(nimble):Handled IRK/LTK deletion based on key availability (v5.1)
See merge request espressif/esp-idf!26597
2023-11-21 12:47:54 +08:00
Jiang Jiang Jian
d578395041
Merge branch 'bugfix/secure_boot_v2_docs_v5.1' into 'release/v5.1'
...
fix(docs): correct the target specific macros for secure boot v2 guide (v5.1)
See merge request espressif/esp-idf!27170
2023-11-21 11:10:41 +08:00
morris
64e7343e40
Merge branch 'bugfix/fix_adc_read_zero_h2_v5.1' into 'release/v5.1'
...
ADC: fix adc raw data get 0 because of signal delay on ESP32H2(v5.1)
See merge request espressif/esp-idf!26976
2023-11-21 11:08:57 +08:00
Jiang Jiang Jian
0fa38244cb
Merge branch 'bugfix/newlib_test_correct_assertions_v5.1' into 'release/v5.1'
...
fix(newlib,ci): wrong floating point number handling in tests (v5.1)
See merge request espressif/esp-idf!27090
2023-11-21 11:08:32 +08:00
Jiang Jiang Jian
de81da8b53
Merge branch 'bugfix/fix_espcoredump_compilation_warning_v5.1' into 'release/v5.1'
...
fix(espcoredump): fixed compilation warning (v5.1)
See merge request espressif/esp-idf!26591
2023-11-21 11:07:57 +08:00
Jiang Jiang Jian
b3479b3164
Merge branch 'bugfix/docs_hw_breakpoints_num_v5.1' into 'release/v5.1'
...
fix(docs/jtag): Fix hard-coded HW breakpoints/watchpoints number (v5.1)
See merge request espressif/esp-idf!26500
2023-11-21 11:07:13 +08:00
Jiang Jiang Jian
2277c3c9dd
Merge branch 'feature/pseudo_exccause_to_openocd_v5.1' into 'release/v5.1'
...
Feature/pseudo exccause to openocd (v5.1)
See merge request espressif/esp-idf!26544
2023-11-21 11:06:41 +08:00
Jiang Jiang Jian
58344b1517
Merge branch 'backport-v5.1/gcov-write-fix' into 'release/v5.1'
...
fix(app_trace): fix host file write API return value
See merge request espressif/esp-idf!26421
2023-11-21 11:06:04 +08:00
morris
6bc8a025d5
Merge branch 'bugfix/ledc_max_duty_cycle_v5.1' into 'release/v5.1'
...
fix(ledc): fix ledc driver 100% duty cycle configuration (backport v5.1)
See merge request espressif/esp-idf!27179
2023-11-21 10:58:16 +08:00
Jiang Jiang Jian
e718b603e4
Merge branch 'bugfix/clear_ulp_wake_intr_in_wake_source_enable_v5.1' into 'release/v5.1'
...
fix(esp_hw_support): clear all type ULP wakeup intr status at ulp wakeup source enable (backport v5.1)
See merge request espressif/esp-idf!27188
2023-11-21 10:52:54 +08:00
Jiang Jiang Jian
0e1ec38785
Merge branch 'bugfix/fix_lightsleep_current_leakage_on_usj_pad_v5.1' into 'release/v5.1'
...
fix(esp_hw_support): fix lightsleep current leakage on usb pad (backport v5.1)
See merge request espressif/esp-idf!27205
2023-11-21 10:51:11 +08:00
gongyantao
1978b711f0
ci(bt/bluedroid): remove configs that are not in effect
2023-11-21 10:09:40 +08:00
Abhinav Kudnar
533b4a2e02
fix(nimble): Handled IRK/LTK deletion based on key availability
2023-11-21 07:15:56 +05:30
Rahul Tank
443a612a46
Merge branch 'bugfix/pairing_when_enc_with_no_key_fails_v5.1' into 'release/v5.1'
...
fix(nimble): Initate pairing if encryption fails with reason no pin or key missing (v5.1)
See merge request espressif/esp-idf!27017
2023-11-21 09:05:44 +08:00
Rahul Tank
c75bab8fcb
fix(nimble): Initate pairing if encryption fails with reason no pin or key missing
2023-11-20 20:22:48 +05:30
Rahul Tank
3b30594eef
Merge branch 'bugfix/ble_gap_unpair_oldest_peer_v5.1' into 'release/v5.1'
...
fix(nimble): Fixed incorrect handling of bonded devices (v5.1)
See merge request espressif/esp-idf!26939
2023-11-20 22:41:11 +08:00
Mahavir Jain
78453c8918
docs(ecdsa): add a note about TRNG dependency for ECDSA peripheral
2023-11-20 16:17:51 +05:30
Mahavir Jain
bb1376ff5d
fix(api-docs): include in the ECDSA APIs for doxygen build
2023-11-20 16:17:11 +05:30
Mahavir Jain
d9abb44049
docs: add ECDSA peripheral chapter for H2/P4
...
- Add ECDSA peripheral chapter and instructions to program efuse key block
- Update security guide for ECDSA peripheral mention for device identity
- Link with ESP-TLS guide about using ECDSA peripheral in TLS connection
2023-11-20 16:13:35 +05:30
Mahavir Jain
2cd1635b86
fix(ecdsa): remove unused k_mode from the ECDSA HAL/LL API
...
For ESP32-H2 case, the hardware k mode is always enforced through
efuse settings (done in startup code).
For ESP32-P4 case, the software k mode is not supported in the peripheral
itself and code was redundant.
2023-11-20 16:05:15 +05:30
Mahavir Jain
0ccfa4b0c2
fix(esp32h2): program use_hardware_k efuse bit for ECDSA key purpose
...
In ESP32-H2, the ECDSA peripheral by default uses the TRNG (hardware)
generated k value but it can be overridden to software supplied k.
This can happen through by overriding the `ECDSA_SOFTWARE_SET_K` bit
in the configuration register. Even though the HAL API is not exposed
for this but still it could be achieved by direct register
programming. And for this scenario, if sufficiently random k is not
supplied by the software then it could posses a security risk.
In this change, we are unconditionally programming the efuse
`ESP_EFUSE_ECDSA_FORCE_USE_HARDWARE_K` bit during startup security
checks itself. Additionally, same is ensured in the `esp_efuse_write_key`
API as well. This always enforces the hardware k mode in the ECDSA
peripheral and ensures strongest possible security.
2023-11-20 16:03:29 +05:30
Frantisek Hrbata
4c3beef656
feat(ci): add test for custom cmake CMAKE_EXECUTABLE_SUFFIX
...
Signed-off-by: Frantisek Hrbata <frantisek.hrbata@espressif.com>
2023-11-20 11:03:28 +01:00
Mahavir Jain
ecd485be87
Merge branch 'feat/ecdsa_perph_while_mutual_auth_v5.1' into 'release/v5.1'
...
Feat/ecdsa perph while mutual auth v5.1
See merge request espressif/esp-idf!27245
2023-11-20 18:03:19 +08:00