- Aug 27, 2024
-
-
Szymon Janc authored
When change unaware client send ATT request it shall get Database Out of Sync error. Reading GATT database hash is an exception here. This was affecting GATT/SR/GAS/BV-05-C qualification test case. Signed-off-by:
Szymon Janc <szymon.janc@codecoup.pl> (cherry picked from commit 77cbd27a)
-
- Aug 26, 2024
-
-
Dat Nguyen Duy authored
In SoC imxrt1010, edma channel has separate interrupt entry, not like the rest of in-tree imxrt SoC series Signed-off-by:
Dat Nguyen Duy <dat.nguyenduy@nxp.com> (cherry picked from commit b7b17fa0)
-
Joel Guittet authored
Fix undefined reference to MSG_DONTWAIT while building websocket client. Signed-off-by:
Joel Guittet <joelguittet@gmail.com> (cherry picked from commit 4c16ec1f)
-
Peter van der Perk authored
IMXRT117X bus clock should be 240MHz and IMXRT116X should be 200MHz Signed-off-by:
Peter van der Perk <peter.vanderperk@nxp.com> (cherry picked from commit d1a6b453)
-
Anders Bjørn Nedergaard authored
IMXRT11XX secondary core should not deinit ENET PLL as it could be configured by primary core. Signed-off-by:
Anders Bjørn Nedergaard <abn@polytech.com> (cherry picked from commit 29dc419a)
-
- Aug 22, 2024
-
-
Jonathan Rico authored
Trigger the TX processor on connection teardown. When a disconnection happens before the controller has acknowledged some ACL fragments the host has sent, we run `process_unack_tx()` to free those unacknowledged buffers and their associated TX contexts. The problem is that the TX processor still holds a reference to the conn object. That reference is not released until the TX processor is triggered again and figures out that the connection is invalid. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit 80a92f51)
-
Jonathan Rico authored
Verifies that we don't leak connection references when the peer goes out of range whilst we are fragmenting and sending data to the controller. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit 043de7da)
-
- Aug 21, 2024
-
-
Ioannis Damigos authored
Writing directly to Px_DATA_REG modifies pins which are not indicated by mask, causing gpio_basic_api test to fail. Use Px_SET_DATA_REG and Px_RESET_DATA_REG to modify only pins indicated by mask. Signed-off-by:
Ioannis Damigos <ioannis.damigos.uj@renesas.com> (cherry picked from commit 782967a1)
-
Ioannis Damigos authored
Remove pdc entry only if index exists when CONFIG_PM is set. Signed-off-by:
Ioannis Damigos <ioannis.damigos.uj@renesas.com> (cherry picked from commit 82d17f1f)
-
Ioannis Damigos authored
Set pin to input with no resistors selected when it is configured as GPIO_DISCONNECTED. Signed-off-by:
Ioannis Damigos <ioannis.damigos.uj@renesas.com> (cherry picked from commit df868603)
-
Ioannis Damigos authored
Clear pending interrupts after disabling TRNG to avoid smartbond_trng_isr getting called with TRNG disabled Signed-off-by:
Ioannis Damigos <ioannis.damigos.uj@renesas.com> (cherry picked from commit bacd6c31)
-
Jonathan Rico authored
This function call frees the buffer kept by the host for reassembling L2CAP PDUs into. Without this call, the current buffer will eventually be leaked, leading to a non-functional host due to lack of RX buffers. The effect is worse when host flow control is not enabled, as the RX buffer pool is shared with events, which means communication with the controller is essentially dead. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit 8a2fe27c)
-
Jonathan Rico authored
`net_buf_alloc(K_FOREVER)` can now return NULL if running in the system workqueue. `bt_hci_evt_create()` is called in that context in a few cases. Since we can't really do anything about it, add a (default-on) assert. This should ideally never fail. I saw it fail because of a leak in the ACL buffer pool, which is also shared with events when host flow control is not enabled. In that particular case, the host is rendered non-functional, so trying to recover using error handling is futile. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit 5a4fdfbf)
-
Jonathan Rico authored
Add a test that verifies no resources are leaked when re-assembling L2CAP PDUs over an unreliable channel (ie. lots of disconnects). Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit e489ec2b)
-
- Aug 20, 2024
-
-
Benjamin Cabé authored
set _XOPEN_SOURCE appropriately to avoid compilation errors due to missing S_IFxxx macros on some systems. Signed-off-by:
Benjamin Cabé <benjamin@zephyrproject.org> (cherry picked from commit 4458a05e)
-
Théo Battrel authored
This test create a setup where an ISO broadcaster will send fragmented data and get stopped after sending the first fragment and repeating that operation multiple time to verify that buffers are not leaked. Signed-off-by:
Théo Battrel <theo.battrel@nordicsemi.no> (cherry picked from commit f3dcaaee)
-
Théo Battrel authored
When sending data using ISO and the data is fragmented, if the connection is cut before all the fragments are sent, the data buffer will be leaked. Fix the issue by unref'ing the buffer when ISO is not in a connected state. Signed-off-by:
Théo Battrel <theo.battrel@nordicsemi.no> (cherry picked from commit 3a098c9f)
-
Théo Battrel authored
When disconnected while sending data, if ISO doesn't get the number of completed packets it will not call `process_unack_tx` and thus will leak TX context. Fix that by setting the connection state in ISO disconnection which will trigger a call to `process_unack_tx`. Signed-off-by:
Théo Battrel <theo.battrel@nordicsemi.no> (cherry picked from commit 70696f5b)
-
- Aug 19, 2024
-
-
Maxime Vincent authored
Add clock init for nxp-ctimer-pwm DTS nodes. Signed-off-by:
Maxime Vincent <maxime@veemax.be> (cherry picked from commit 3a895ece)
-
- Aug 18, 2024
-
-
Robert Lubos authored
http1_headers_sent flag has to be cleared when entering HTTP_SERVER_REQUEST_STATE and not only on the client init. Otherwise, serving multiple HTTP1 POST requests over the same connection does not work as intended (headers were not sent for the second and further requests). Signed-off-by:
Robert Lubos <robert.lubos@nordicsemi.no> (cherry picked from commit 086faa56)
-
- Aug 17, 2024
-
-
Henrik Brix Andersen authored
Add missing "0" to the SRAM devicetree node addresses. Signed-off-by:
Henrik Brix Andersen <henrik@brixandersen.dk> (cherry picked from commit ec85b0b4)
-
Ryan Erickson authored
The OK response should be processed before entering CMUX mode. Use UART ISR mode by default. Fix warnings and errors produced by the sample. Signed-off-by:
Ryan Erickson <ryan.erickson@ezurio.com> (cherry picked from commit bbcf23e9)
-
- Aug 16, 2024
-
-
Alberto Escolar Piedras authored
gcc 13 produces a build warning (see below), as it seems to believe the number of read bytes may overflow the frame_size type. Let's increase the frame_size bitwidth to avoid this. (Any 32bit type, signed or unsigned, avoids this warning) The build warning: ``` In file included from /usr/include/features.h:502, from bits/libc-header-start.h:33, from /usr/include/stdint.h:26, from include/stdint.h:9, from zephyr/include/zephyr/types.h:11, from zephyr/include/zephyr/kernel_includes.h:21, from zephyr/include/zephyr/kernel.h:17, from zephyr/drivers/bluetooth/hci/userchan.c:9: In function ‘read’, inlined from ‘rx_thread’ at drivers/bluetooth/hci/userchan.c:201:9: /usr/include/i386-linux-gnu/bits/unistd.h:28:10: warning: ‘__read_alias’ specified size between 4294902273 and 4294967295 exceeds maximum object size 2147483647 [-Wstringop-overflow=] 28 | return __glibc_fortify (read, __nbytes, sizeof (char), | ^~~~~~~~~~~~~~~ drivers/bluetooth/hci/userchan.c: In function ‘rx_thread’: drivers/bluetooth/hci/userchan.c:187:32: note: destination object allocated here 187 | static uint8_t frame[512]; | ^~~~~ /usr/include/i386-linux-gnu/bits/unistd-decl.h:29:16: note: in a call to function ‘__read_alias’ declared with attribute ‘access (write_only, 2, 3)’ 29 | extern ssize_t __REDIRECT_FORTIFY (__read_alias, (int __fd, void | ^~~~~~~~~~~~~~~~~~ ``` Signed-off-by:
Alberto Escolar Piedras <alberto.escolar.piedras@nordicsemi.no> (cherry picked from commit ee08327b)
-
Vinayak Kariappa Chettimada authored
Relax the radio packet pointer assignment deadline assertion until access address being transmitted. The PDU buffer is probably only needed just after access address is being transmitted or received by the radio. This will give some more breathing room for slow CPUs like in nRF51x SoCs. Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit 4dbfb22a)
-
Vinayak Kariappa Chettimada authored
Fix regression using speed optimization introduced in commit 1b7fe792 ("Bluetooth: Controller: Support Link Time Optimizations (LTO)"). Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit 642d4be9)
-
Vinayak Kariappa Chettimada authored
Fix regression in encrypted connection introduced in commit f3deccda ("Bluetooth: Controller: CCM read data to early when DF enabled on PHY 1M"). Due to this nRF51x SoC hang waiting to encrypt and/or check MIC. Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit b9a7a645)
-
Vinayak Kariappa Chettimada authored
In case of ISR latencies, if packet pointer has not been set on time then we do not want to check uninitialized length in rx buffer that did not get used by Radio DMA. This would help us in detecting radio ready event being set? We can not detect radio ready if it happens twice before Radio ISR executes after latency. Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit 40b71c97)
-
Vinayak Kariappa Chettimada authored
Only 3 bytes (PDU_EM_LL_SIZE_MAX) is required for empty PDU transmission, but in case of Radio ISR latency if rx packet pointer is not setup then Radio DMA will use previously assigned buffer which can be this empty PDU buffer. Radio DMA will overrun this buffer and cause memory corruption. Any detection of ISR latency will not happen if the ISR function pointer in RAM is corrupted by this overrun. Increasing ISR latencies in OS and CPU usage in the ULL_HIGH priority if it is same as LLL priority in Controller implementation then it is making it tight to execute Controller code in the tIFS between Tx-Rx PDU's Radio ISRs. Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit e36ddffa)
-
Vinayak Kariappa Chettimada authored
Fix ISR profiling when using single timer for tIFS radio switching wherein in the timer is cleared on every radio end. Hence, the captured timer value is the latency and does not required the radio end timestamp to be subtracted. Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit 8ef919a7)
-
Vinayak Kariappa Chettimada authored
Provide Radio ISR latency in microseconds when asserting due to high ISR latency. Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit 53b6bc56)
-
Vinayak Kariappa Chettimada authored
Add ISR profiling using ticker ticks, hence profile ISR CPU use outside radio events. Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit 409402f0)
-
Vinayak Kariappa Chettimada authored
Use uint16_t to store ISR profiling value to avoid overflow in case of higher latencies. Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit 56ca9b87)
-
Vinayak Kariappa Chettimada authored
Fix in-system ISR profiling for advertiser and connection role for the missing implementation when there is CRC error. Signed-off-by:
Vinayak Kariappa Chettimada <vich@nordicsemi.no> (cherry picked from commit 90bc2b20)
-
Erik Tamlin authored
Update the percepio module to use TraceRecorder v4.9.2.hotfix1 Signed-off-by:
Erik Tamlin <erik.tamlin@percepio.com> (cherry picked from commit 858a6870)
-
- Aug 09, 2024
-
-
Jonathan Rico authored
It was not being set, and thus if the user_data contained garbage from before, then conn.c would attempt to call that garbage. Static channels don't have this issue, as every "SDU" fits into one PDU. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> Co-authored-by:
Huajiang Zheng <nxf88597@lsv051208.swis.nl-cdc01.nxp.com> (cherry picked from commit 1c651031)
-
Jonathan Rico authored
It's already done. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit 8d7c1bc7)
-
Jonathan Rico authored
Modify the test so it checks that user_data is used and then cleared by the stack. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit 08706f98)
-
Jonathan Rico authored
Storing stuff in user_data? That's a paddlin' We have been debugging issue after issue because ownership of this "user" data is not clearly defined. Now it is. L2CAP owns the user_data field entirely, as soon as `send()` is called. Also add a warning and retval using CHECKIF. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit ea944997)
-
Jonathan Rico authored
Werror fails the build on that function. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit 5c6cd277)
-
Jonathan Rico authored
Print user_data and callback pointers. Signed-off-by:
Jonathan Rico <jonathan.rico@nordicsemi.no> (cherry picked from commit d02a13d7)
-