-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNM: Ble stack and init #20205
DNM: Ble stack and init #20205
Conversation
Use zsock_addrinfo to avoid dependency on the POSIX subsystem. Remove CONFIG_POSIX_API from provisioning tests. Signed-off-by: Juha Ylinen <juha.ylinen@nordicsemi.no>
... because this causes conflicting types compilation errors in library files it uses. Signed-off-by: Andrzej Głąbek <andrzej.glabek@nordicsemi.no>
Test scenarios `shell.device_filter` and `init.check_init_priorities` should be fixed in Zephyr first. Signed-off-by: Katarzyna Giądła <katarzyna.giadla@nordicsemi.no>
This option was replaced with IEEE802154_L2_PKT_INCL_FCS in upstream Zephyr. See Zephyr PR 83449. Signed-off-by: Andrzej Głąbek <andrzej.glabek@nordicsemi.no>
MBEDTLS PSA requires more stack sizes. Increasing the stack sizes for both nrf54840 and nrf54l15. Signed-off-by: alperen sener <alperen.sener@nordicsemi.no>
-This added SYS_INIT will ensure that psa_crypto_init is called in kernel *after* Hw_CC3XX is executed to ensure that mutexes are ready to be used. Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-Changing default y for nrf_security to use DT_HAS_ZEPHYR_PSA_CRYPTO_RNG_ENABLED instead of depending on ENTROPY_PSA_CRYPTO_RNG. Doing this avoids a dependency loop on ENTROPY_GENERATOR Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-This commit is only used to enact testing. The dependency for PR nrfconnect#2464 to the previous commit is inherent, but we would like to have a commit that is pickable in the upmerge Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
This is required by PSA in NCS, so make sure it is selected NRF_SECURITY_ENABLER. Signed-off-by: Sean Madigan <sean.madigan@nordicsemi.no>
-Enabling ENTROPY_GENERATOR for BT_HOST_CRYPTO_PRNG and BT_ECC as a workaround of having ENTROPY_GENERATOR in sample/tests Also the heap size required for bsim is larger than on actual target, reason unknown. Signed-off-by: Sean Madigan <sean.madigan@nordicsemi.no> Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
The NRF_RNG_ENTROPY_DRIVER provides entropy though the PSA APIs. This is used to seed/reseed the Oberon PSA random drivers (CTR_DRBG/HMAC_DRBG). Before this was only used to allow enabling this PSA driver with the devices which use the DT label 'rng'. We extend that now to allow this driver to be used with the fake entropy node which uses the DT label 'prng'. This is needed to unblock development until real RNG is enabled for all the needed applications/samples. In practice this means that when 'prng' is enabled a device can generate random numbers with the psa_generate_random call. Signed-off-by: Georgios Vasilakis <georgios.vasilakis@nordicsemi.no>
-Adding CONFIG_MBEDTLS_FORCE_LEGACY_MD for cc3xx/oberon legacy psa_tls to avoid that MBEDTLS_MD_SOME_PSA is getting set Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-Fixes issues with nRF54H20 and nRF5340dk in upmerge. This can be seen as a workaround -Adjusting board-files for central_uart and peripheral_uart for nRF5340 and nRFH20 cpuapp Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-HKDF reports errors when MBEDTLS_MD_SOME_PSA is set. Setting this configuration to avoid trying to resolve with PSA APIs. This configurations and these tests to be removed with more standardization on PSA crypto Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
Increased stack sizes to prevent the stack overflows. Jira: NCSDK-31374 Signed-off-by: Mateusz Kapala <mateusz.kapala@nordicsemi.no>
-Adjusting CONFIG_HEAP_MEM_POOL_SIZE down from 2048 to 1536 to try to get the smallest devices to build Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-Setting main stack size to 3584 for nRF54LX series that enable rng to avoid stack overflow Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-This commit removes CONFIG_MAIN_STACK_SIZE in BLE Samples. The adjustments were initially made to give more stack than upstream, but due to the change to PSA crypto it ends up being something that limits higher stack sizes (e.g. on CRACEN devices) Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-Note that nRF52810 devices is removed to avoid failures in twister -This removes default-set stack sizes to get more BLE samples to work in the latest upmerge Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-Note that this removed nRF52805, nrf52810 and nrf52811 from build in the peripheral_uart_minimal. This may be reverted if there is a movement of more items to the BT_LONG_WORKQUEUE instead of using system workqueueue -Removing overrides to stack-sizes for peripheral_uart sample regular and minimal configuration Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
bd872da
to
e5920ec
Compare
As in the topic Signed-off-by: Maciej Perkowski <maciej.perkowski@nordicsemi.no> Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-Ended up with defaults likely to low Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
-Removing nRF54L05 because it is overflowing on RAM size (~500 bytes). This commit can be reverted when/if the sample is optimized a bit for RAM size. Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
e5920ec
to
0c94067
Compare
-There was no pattern to increase stack-size for nRF54H20 devices likely leading to a few issues of stack overflow. Thiscommit adds a pattern to set the stack-sizes a bit up for nRF54H20 CPUAPP and CPURAD Signed-off-by: Frank Audun Kvamtrø <frank.kvamtro@nordicsemi.no>
Memory footprint analysis revealed the following potential issuesapplications.nrf_desktop.zdebug[nrf52840gmouse/nrf52840]: RAM size increased by 5884[B] in comparison to the main[8a5cdf9] branch. - link (cc: @MarekPieta) Note: This message is automatically posted and updated by the CI (latest/sdk-nrf/PR-20205/24) |
This pull request has been marked as stale because it has been open (more than) 30 days with no activity. Remove the stale label or add a comment saying that you would like to have the label removed otherwise this pull request will automatically be closed in 7 days. Note, that you can always re-open a closed pull request at any time. |
Just for test
Just for testing. Changes will be taken in #19720 if this works
test_low_level: PR-1765
test_rs: PR-1483
test_fem: PR-1483
test_ble_mesh: ble_mesh_upmerge_test
test_crypto: PR-750
test_suit_dfu: PR-450
test_tfm: PR-194
test_secdom_samples_public: NCSDK-NONE_upmerge_jan2025
test_audio: PR-294
test_wifi: sdk-nrf-pr-19720
test_nrf: sdk-nrf-pr-19720
test_proprietary: PR-93