-
Notifications
You must be signed in to change notification settings - Fork 716
[nrf noup] ci: enable custom brase for manifest-PR #3157
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Closed
DatGizmo
wants to merge
42
commits into
nrfconnect:ncs-v3.1-branch
from
DatGizmo:v3.1-release-branch
Closed
[nrf noup] ci: enable custom brase for manifest-PR #3157
DatGizmo
wants to merge
42
commits into
nrfconnect:ncs-v3.1-branch
from
DatGizmo:v3.1-release-branch
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add support for nRF54lm20a to the hci_uart sample. Signed-off-by: Gordon Klaus <[email protected]>
…samples Add support for nRF54lm20a to the beacon and peripheral_hr samples. Upstream PR #: 93917 Signed-off-by: Gordon Klaus <[email protected]>
This reverts commit 6b37917. Changes were moved to upstream in PR #93813. Signed-off-by: Michal Kozikowski <[email protected]>
Update signing script to use proper arguments for imgtool when SHA512 or pure signature is needed. Signed-off-by: Michal Kozikowski <[email protected]> (cherry picked from commit 6c72cd3)
Allow to use CONFIG_BT_ID_AUTO_SWAP_MATCHING_BONDS Kconfig option even if CONFIG_BT_PRIVACY is disabled. This is because CONFIG_BT_PRIVACY configures privacy of local device will still allows to resolve peer address. During pairing, peer device may send its Identity Address and IRK which then can be used for address resolution. This doesn't require CONFIG_BT_PRIVACY be enabled. nrf-squash! [nrf noup] bluetooth: host: Add support for bonding with same peer Signed-off-by: Pavel Vasilyev <[email protected]>
Adds support for outputting details on sysbuild Kconfigs for use with the documentation Kconfig lookup tool Upstream PR #: 93861 Signed-off-by: Jamie McCrae <[email protected]>
Update the HW models module to: 6e5961223f81aa2707c555db138819a5c1b7942c Including the following: 6e59612 CLOCK (52,53): Fix test interface with multiple instances ecf2292 54 CRACEN: Improve model 1277b16 irq controller: Remove out of date comment Signed-off-by: Alberto Escolar Piedras <[email protected]> (cherry picked from commit e1c37f6) Signed-off-by: Rubin Gerritsen <[email protected]>
Update the HW models module to: 8b6001d6bdd9e2c8bb858fdb26f696f6d5f73db5 Including the following: 8b6001d CLOCK (54): Fix XOTUNE subscription sideeffecting for nrf54L15 9af1ac8 nRF54LM20: Bugfix: Add missing UART configuration e6af4a7 RADIO: Fix register init for some devices (at least nRF54LM20) 2fe99ab CLOCK (54): Add XO24M/PLL24M/HFCLK24M ffd578a CLOCK (54): Fixes around XOTUNE Signed-off-by: Alberto Escolar Piedras <[email protected]> (cherry picked from commit e7115d0) Signed-off-by: Rubin Gerritsen <[email protected]>
tisci_cmd_get_fwl_region is defined three times which is causing doc build errors Upstream PR #: 93968 Signed-off-by: Yuxuan Cai <[email protected]>
Added missing supported reset reasons based on conditional guards. Upstream PR #: 93910 Signed-off-by: Michał Stasiak <[email protected]>
… causes Check whether used reset causes are supported by hwinfo driver. Upstream PR #: 93910 Signed-off-by: Michał Stasiak <[email protected]>
Extension of the validate_base_addresses.c file to cover GPREGRET in all Nordic SoCs. Signed-off-by: Karol Lasończyk <[email protected]> (cherry picked from commit 8f2d3e7)
Fix for wrongly addressed GPREGRET space. Signed-off-by: Karol Lasończyk <[email protected]> (cherry picked from commit d55ee09)
Fix Max Chunk reporting during Block_Information_Get:
If friendship is established, then max possible chunk size for transfer
is reported according to friend's queue size.
ChunkSize = (FndQ sz * Bytes per seg (12)) - Opcode(1) - Chunk_Num (2)-
8 byte MIC (max)
= (FndQ sz * 12) - 11
This allows all segments of Chunk_Transfer messages to fit in a friend
queue. If this is not done, friend queue keeps overflowing
systematically causing unstable PULL_MODE transfers.
Fix Chunk requests:
Adapt number of requested chunks according to current friend queue size.
If friend queue is too small, at least 1 chunk is requested.
Signed-off-by: Omkar Kulkarni <[email protected]>
(cherry picked from commit 602fd0d)
…EC instances NRFX should support multiple QDEC devices operation. Signed-off-by: Bartosz Miller <[email protected]> (cherry picked from commit 08cc78c)
…nce until fixed Disable testing second QDEC instance until the issue with multiple QDEC instances support is resolved Signed-off-by: Bartosz Miller <[email protected]> (cherry picked from commit 39b2451)
- Fixed pin configuration for nRF54L15 (QDECs can use only port 1) - Changed the way the test handles testing multiple instances to make it possible to output quadrature signal to one QDEC instance at a time. Upstream PR #: 93927 Signed-off-by: Michał Bainczyk <[email protected]>
Increased stack sizes for mesh provisoner sample. Values are based of thread analysis, plus added margin. Signed-off-by: Stine Åkredalen <[email protected]>
The order of the enumNames array needs to match the actual enum values array below it. Signed-off-by: Carles Cufi <[email protected]> (cherry picked from commit d215f5e)
Fix typo in BICR schema Signed-off-by: Håkon Amundsen <[email protected]> (cherry picked from commit e96a63a)
Add support for DMM which manages cache and dedicated memory spaces. Upstream PR #: 90751 Signed-off-by: Jakub Zymelka <[email protected]>
…duce register access" This reverts commit 8cba1f6. Signed-off-by: Krzysztof Chruściński <[email protected]>
This reverts commit d87f317. Signed-off-by: Robert Lubos <[email protected]>
This reverts commit 691b66e. Signed-off-by: Robert Lubos <[email protected]>
Instead of using 32 bit enum values for event numbers, convert the code to use 64 bit long bit fields. This means that the user API is changed to use 64 bit event values instead of 32 bit event values. Signed-off-by: Jukka Rissanen <[email protected]> (cherry picked from commit 5a9a39c) Signed-off-by: Robert Lubos <[email protected]>
…t_mgmt sockets We cannot use the network management event number directly as a socket option value because the management value is uint64_t and that cannot be mapped directly to 32 bit integer. So have an intermediate socket option that is mapped to actual network management request number in getsockopt() and setsockopt(). Signed-off-by: Jukka Rissanen <[email protected]> (cherry picked from commit 2ed2232) Signed-off-by: Robert Lubos <[email protected]>
…I changes Add information how the net_mgmt request handler is changed. The event number type is changed from uint32_t to uint64_t to allow the event command to be a bit mask instead of enum value. Signed-off-by: Jukka Rissanen <[email protected]> (cherry picked from commit 6b0597f) Signed-off-by: Robert Lubos <[email protected]>
As per API overview documentation, a braking API change must increment major version number. https://docs.zephyrproject.org/latest/develop/api/overview.html#api-overview Signed-off-by: Jukka Rissanen <[email protected]> (cherry picked from commit b1a8655) Signed-off-by: Robert Lubos <[email protected]>
This has been missed in net_mgmt rework in commit 5a9a39c. Signed-off-by: Robert Lubos <[email protected]> (cherry picked from commit 3e70425)
net_event.h header makes use of macros defined in net_mgmt.h, therefore it should include that header. Signed-off-by: Robert Lubos <[email protected]> (cherry picked from commit ae7d7a8)
Support to configure BSS max idle period at runtime. Signed-off-by: Ajay Parida <[email protected]> (cherry picked from commit c70b350) Signed-off-by: Robert Lubos <[email protected]>
30s is too aggressive for most APs, and hostapd also uses 5mins as the default value. Signed-off-by: Chaitanya Tata <[email protected]> (cherry picked from commit 59ff126) Signed-off-by: Robert Lubos <[email protected]>
Add check for the RX data buffer size. It should be atleast 400 bytes, anthing less than that scan fails. Upstream PR #: 94106 Signed-off-by: Kapil Bhatt <[email protected]>
Updates the LE legacy pairing procedure as a result of errata ES-24491. New part: If the initiating device receives an LP_CONFIRM_R value that is equal to the LP_CONFIRM_I value, the pairing process shall be aborted and fail with "Confirm Value Failed" as reason. Signed-off-by: Håvard Reierstad <[email protected]> (cherry picked from commit 2a8118c) Signed-off-by: Håvard Reierstad <[email protected]>
…d Public Key Core Specification 6.1 clarified exptected erro code in case peer sending invalid Public Key. In case pairing is aborted during or immediately after Public Key Exchange phase has completed (which is the case here) expected reason code is set to "DHKey Check Failed". This was affecting SM/CEN/KDU/BI-04-C and SM/PER/KDU/BI-04-C qualification test cases. Signed-off-by: Szymon Janc <[email protected]> (cherry picked from commit 9b27a47) Signed-off-by: Håvard Reierstad <[email protected]>
…de-svc userdata - Issue: There is a bus-fault while accessing empty userdata structure pointer if application does not include any include service userdata instance (which consist of UUID list of included service) but service array has defined dummy entry for it assumed to be overridden by app during initial flow. - For example, the issue has happened in case of tmap-central sample without "CONFIG_BT_OTS" support. there are some MCS attributes dependent on OTS service because of that "BT_GATT_INCLUDE_SERVICE(NULL)" entry is added as part of service definition. The given entry does not have userdata handler defined and is expecting to be overriden by the app if it will be included. During "bt_mcs_init()" call, "mcs.attrs[i].user_data" is not populated with any attr-instance pointer. This makes CPU to access null-address during reading local-database include-service attribute which was not provided by the app but the include-service entry was added to the db. - Fix: Adding condition to check if user-data has null address, and returning back to avoid any hard-faults. Signed-off-by: Nirav Agrawal <[email protected]> (cherry picked from commit 5a8189b) Signed-off-by: Håvard Reierstad <[email protected]>
The implementation used BT_L2CAP_ECRED_MIN_MTU to check the lower limits of both MTU and MPS, instead of BT_L2CAP_ECRED_MIN_MPS for MPS. While these are the same here, confusion may arise. This commit fixes the confusion. Signed-off-by: Håvard Reierstad <[email protected]> (cherry picked from commit d989188) Signed-off-by: Håvard Reierstad <[email protected]>
Adds a missing requirement from Core Spec V6.0 Vol 3.A chapters 10.1 and 10.2 to ignore L2CAP_FLOW_CONTROL_CREDIT_IND packets with the credit value set to 0. Matches existing credit-related functions by checking that the CID is in the dynamic range (you can't add credits to fixed channels). Signed-off-by: Håvard Reierstad <[email protected]> (cherry picked from commit 2b42a1d) Signed-off-by: Håvard Reierstad <[email protected]>
Check whether the connection response parameters both with and without ECRED are within the valid ranges from the Bluetooth Core Specification (part 3.A.4 v6.0). Changes validation checks in requests to match the same pattern. Signed-off-by: Håvard Reierstad <[email protected]> (cherry picked from commit 7debc8a) Signed-off-by: Håvard Reierstad <[email protected]>
The many_conn l2cap test used a MTU lower than the minimum permitted value. This commit bumps it to the minimum (23). Signed-off-by: Håvard Reierstad <[email protected]> (cherry picked from commit b799d18) Signed-off-by: Håvard Reierstad <[email protected]>
…uicr.py Upstream PR #: 94064 Set the VERSION field to 2.0 in gen_uicr.py to indicate the version of the format the script produces blobs for. This is required for forwards compatibility with newer versions of IronSide SE. Signed-off-by: Jonathan Nilsen <[email protected]>
new arg base-branch defaults to main, but can map zephyr release branch to nrf release base Signed-off-by: Sebastian Wezel <[email protected]>
|
The following west manifest projects have changed revision in this Pull Request:
✅ All manifest checks OK Note: This message is automatically posted and updated by the Manifest GitHub Action. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
new arg base-branch defaults to main,
but can map zephyr release branch to nrf release base
Signed-off-by: Sebastian Wezel [email protected]