Commit Graph

32103 Commits

Author SHA1 Message Date
Marius Vikhammer
6c9b4e1b09 Merge branch 'docs/esp_event_minor_update_v5.1' into 'release/v5.1'
fix(docs): Minor update to esp_event.rst for improved user experience (v5.1)

See merge request espressif/esp-idf!29124
2024-02-27 17:55:21 +08:00
Marius Vikhammer
f62f2cf3a7 Merge branch 'docs/add_cannonical_url_v5.1' into 'release/v5.1'
docs(build): add cannonical stable url to all docs (v5.1)

See merge request espressif/esp-idf!28848
2024-02-27 17:55:08 +08:00
Marius Vikhammer
51b461e6b4 Merge branch 'bugfix_lp_i2c_not_in_od_mode_v5.1' into 'release/v5.1'
fix(lp_i2c): Fixed an issue where the LP_I2C IO lines were not in open-drain mode (v5.1)

See merge request espressif/esp-idf!28771
2024-02-27 17:51:37 +08:00
Marius Vikhammer
51c263bd8f Merge branch 'bugfix/linenoise_calculates_negative_prompt_len_v5.1' into 'release/v5.1'
fix(console): Fixed linenoise prompt length calculation (v5.1)

See merge request espressif/esp-idf!28527
2024-02-27 17:51:08 +08:00
Marius Vikhammer
ba155b0ebd Merge branch 'fix/esp_hw_support_remove_unused_include_dirs_v5.1' into 'release/v5.1'
fix(esp_hw_support): Removed nonexistent include directories from cmake (v5.1)

See merge request espressif/esp-idf!27608
2024-02-27 17:50:51 +08:00
Roland Dobai
acec4e2af2 Merge branch 'fix/gdbgui_py311_v5.1' into 'release/v5.1'
Tools: Fix support of gdbgui on Unix with Python 3.11 (v5.1)

See merge request espressif/esp-idf!28314
2024-02-27 17:47:15 +08:00
Marius Vikhammer
c2274f9ef3 Merge branch 'bugfix/reset_reasons_v5.1' into 'release/v5.1'
Update reset reasons for C6, H2, P4 and C5 (v5.1)

See merge request espressif/esp-idf!29181
2024-02-27 17:47:00 +08:00
Roland Dobai
47207b68ae Merge branch 'fix/gdbgui_py311_v5.1' into 'release/v5.1'
Tools: Fix support of gdbgui on Unix with Python 3.11 (v5.1)

See merge request espressif/esp-idf!28314
2024-02-27 17:46:48 +08:00
Roland Dobai
82563d3861 Merge branch 'fix/kconcheck_checks_v5.1' into 'release/v5.1'
fix(kconfcheck): Fixed false-positive indent errors and extended limits (backport v5.1)

See merge request espressif/esp-idf!28569
2024-02-27 17:46:13 +08:00
Roland Dobai
f85280f0ba Merge branch 'fix/runtool_crcrlf_v5.1' into 'release/v5.1'
fix: save RunTool command output with correct line endings (v5.1)

See merge request espressif/esp-idf!28678
2024-02-27 17:45:52 +08:00
Roland Dobai
b552d069a1 Merge branch 'fix/harden_hints_parsing_v5.1' into 'release/v5.1'
fix: harden input parsing in component_requirements hint module (v5.1)

See merge request espressif/esp-idf!28711
2024-02-27 17:45:31 +08:00
Roland Dobai
68debd061f Merge branch 'feature/python-reorder-imports-instead-isort_v5.1' into 'release/v5.1'
feat: Use python-reorder-imports instead of isort (v5.1)

See merge request espressif/esp-idf!28732
2024-02-27 17:45:15 +08:00
Roland Dobai
4f2de56e11 Merge branch 'fix/py_dep_check_v5.1' into 'release/v5.1'
fix(tools): catch more general errors in python dependency checker (v5.1)

See merge request espressif/esp-idf!29164
2024-02-27 17:44:49 +08:00
Roland Dobai
66ff0e9455 Merge branch 'feat/bump_up_pre_commit_hook_v5.1' into 'release/v5.1'
fix: Bump up pre-commit hooks version (v5.1)

See merge request espressif/esp-idf!29253
2024-02-27 17:43:10 +08:00
Marius Vikhammer
c361705ae7 Merge branch 'update/version_5_1_3' into 'release/v5.1'
Update version to 5.1.3

See merge request espressif/esp-idf!29236
2024-02-27 12:17:40 +08:00
Erhan Kurubas
4f26dcfdff fix(gcov): avoid multiple tick hook registration 2024-02-26 14:05:03 +01:00
KonstantinKondrashov
f185ac42e2 fix(esp_hw_support): Fix esp_intr_free when taks has no core affinity
Closes https://github.com/espressif/esp-idf/issues/12608
2024-02-26 12:05:32 +02:00
Omar Chebib
8176a00282 fix(bootloader): add legacy retained memory CRC calculation
* Closes https://github.com/espressif/esp-idf/issues/12849

In former versions of ESP-IDF, the user custom memory data in the retained memory
was taken into account during the CRC calculation. This was changed in a later
commit, the custom memory was ignored, therefore this can seen as a breaking change.
This commit gives the possibility to choose between the former (legacy) or
new way of calculating the CRC.
2024-02-26 17:35:57 +08:00
Jan Beran
a31bbd11a3 fix: Bump up pre-commit hooks version 2024-02-26 10:34:52 +01:00
wuzhenghui
54a15b81f9
feat: support cache safe assertion check in sleep process
- Add support for cache safe assertion check to ensure that code expected to be in RAM is in IRAM
2024-02-26 17:24:04 +08:00
wuzhenghui
12dca8d086
fix(hal): fix esp32c6 clock bug workaround access flash in wakeup process 2024-02-26 11:42:38 +08:00
Omar Chebib
6519b60c47 fix(peripheral_drivers/dedicated_gpio): Remove dummy byte from the emulate_uart_send routine
Let the user application decide for when to send the dummy byte instead of
hardcoding it from the assembly routine.
2024-02-26 11:42:03 +08:00
Marius Vikhammer
9765dd05d6 fix(heap): fixed missing include in esp_heap_task_info.h
Would fail to compile if esp_heap_task_info.h was included without/before freertos includes
2024-02-26 11:26:49 +08:00
Marius Vikhammer
e7771c75bd versions: Update version to 5.1.3 2024-02-26 11:09:16 +08:00
wuzhenghui
c97f5d79d9
ci: enable hardware crypto module for powersave tests 2024-02-23 18:30:22 +08:00
wuzhenghui
40a869935b
feat(esp_hw_support): support gdma register context sleep retention
Closes https://github.com/espressif/esp-idf/issues/12528
2024-02-23 18:30:17 +08:00
zwl
95a2ad919f bugfix(ble) : fixed some ble issues on ESP32-C2 2024-02-23 18:03:24 +08:00
linruihao
c863eb27da docs: update rf coexistenct api guides
1. support esp32c2
2. fix inconsistency between CN and EN docs of rf coexistence
3. adjust the visibility of some contents based on soc_caps
2024-02-23 16:29:33 +08:00
linruihao
89881c7c59 fix(esp_coex): add support_coexistence soc_caps for esp32c2 and esp32h2 2024-02-23 16:26:10 +08:00
zhanghaipeng
12131f4b8a fix(ble/bluedroid): Update maximum BLE reconnection attempts configuration 2024-02-23 15:51:05 +08:00
zwl
82b34e3431 ble(update):
Update c2 lib to 79be7ec9
Update h2 lib to c6f7cb08
Update c6 lib to c6f7cb08
2024-02-23 14:07:54 +08:00
Mahavir Jain
f1ced5357f fix(spi_flash): check for safe write address in encrypted flash API 2024-02-23 12:42:37 +08:00
Peter Dragun
a17ec488d9 fix(tools): catch more general errors in python dependency checker 2024-02-22 15:51:47 +01:00
Omar Chebib
e7d5fee856 change(espcoredump): save RAM space by placing constants in flash
All the log messages of espcoredump component used to be in DRAM, which would
lower the available RAM space for the user application. Since the cache is always
enabled after an exception, constants can be put in flash.
2024-02-22 18:49:49 +08:00
hongshuqing
80378b809e feat(pmu): set fix voltage to different mode for esp32c6 2024-02-22 15:01:14 +08:00
Marius Vikhammer
d9a6158700 fix(system): update reset reasons for C6 and H2 2024-02-22 12:36:09 +08:00
linruihao
905a0d3d01 fix(esp_coex): fix circular dependency issue on esp32
Closes https://github.com/espressif/esp-idf/issues/13113
2024-02-21 19:15:10 +08:00
KonstantinKondrashov
24f6995fb5 feat(efuse): Add flash&psram efuses for S3 2024-02-21 09:36:49 +02:00
gaoxu
5101e52a36 fix(adc): workaround to fix adc continuous get less results on c3 2024-02-21 13:54:29 +08:00
Jakob Hasse
a66234b6de fix(esp_hw_support): Removed unused include directories from cmake
* Closes https://github.com/espressif/esp-idf/issues/12700
2024-02-21 11:41:11 +08:00
Island
d922d4178f Merge branch 'bugfix/fix_ble_free_all_crash_issue_5.1' into 'release/v5.1'
fix(ble): Fixed the free_all crash on esp32c6 and esp32h2

See merge request espressif/esp-idf!29108
2024-02-20 17:57:42 +08:00
Mahavir Jain
f047237aa5 fix(bootloader_support): check the secure version only for app image
Secure version in the image header is only available for the application
image. However, for certain security workflows, bootloader verifies
itself (own image) and hence the secure version check during that must be
avoided.

Regression introduced in recent commit-id: 3305cb4d

Tested that both secure boot and flash-enc workflows work correctly
with the anti-rollback scenario.
2024-02-20 11:16:56 +02:00
Sudeep Mohanty
57627f5883 fix(docs): Minor update to esp_event.rst for improved user experience
This commit adds semicolons in c-code blocks in esp_event.rst for
improved user experience when directly copying and pasting code.

Closes https://github.com/espressif/esp-idf/issues/13156
2024-02-20 08:45:38 +01:00
ShenWeilong
f05aef3ddf fix(ble): Fixed the free_all crash on esp32c6 and esp32h2 2024-02-19 20:17:17 +08:00
Island
931eaf7320 Merge branch 'bugfix/ble_update_lib_20240207_v5.1' into 'release/v5.1'
update lib on release/v5.1

See merge request espressif/esp-idf!28970
2024-02-19 18:12:41 +08:00
Ondrej Kosta
41b67e1031 fix(esp_eth): improved SPI Ethernet _alloc_recv_buf error handling 2024-02-16 16:03:59 +01:00
harshal.patil
85e18aa755
fix(mbedtls/gcm): Avoid using GCM hardware when config MBEDTLS_HARDWARE_GCM is disabled 2024-02-16 11:55:02 +05:30
harshal.patil
7e4d273e45
fix(mbedtls/gcm): Fix build failure when config MBEDTLS_HARDWARE_GCM is disabled 2024-02-16 11:55:01 +05:30
Ondrej Kosta
8d8fd2b765 feat(esp_eth): added SPI Ethernet module polling mode
Closes https://github.com/espressif/esp-idf/issues/12682
2024-02-15 14:27:45 +00:00
Mahavir Jain
83ec466b26 fix(ota): additional checks for secure version in anti-rollback case
Some additional checks related to secure version of the application in
anti-rollback case have been added to avoid any attempts to boot lower
security version but valid application (e.g., passive partition image).

- Read secure_version under sha256 protection

- First check has been added in the bootloader to ensure correct secure
  version after application verification and loading stage. This check
  happens before setting up the flash cache mapping and handling over
  the final control to application. This check ensures that application
  was not swapped (e.g., to lower security version but valid image) just
  before the load stage in bootloader.

- Second check has been added in the application startup code to ensure
  that currently booting app has higher security version than the one
  programmed in the eFuse for anti-rollback scenario. This will ensure
  that only the legit application boots-up on the device for
  anti-rollback case.
2024-02-15 15:10:28 +02:00