Commit Graph

26446 Commits (tools-release-prep)

Author SHA1 Message Date
Mark Edgeworth 3a57ec7401 IOTBTOOL-377: Fix scatter file include path online 2019-10-23 09:41:04 +01:00
Graham Hammond e83fd322bd IOTBTOOL-407 Fix microbit to use Arm C5
Earlier changes introduced a change to default Arm C6, which does not compile the micro library which is based on Mbed 2. This change fixes the compiler version for NRF51_MICROBIT devices.
2019-09-30 17:09:28 +01:00
Jimmy Brisson 2097512789 Enable Legacy Builds 2019-09-24 14:03:15 +01:00
Martin Kojtal b6e5a0a8af
Merge pull request #11524 from ARMmbed/release-candidate
Release candidate 3 for Mbed OS 5.14
2019-09-20 08:44:58 +02:00
Laurent Meunier 23e61c02dd SysTimer deep sleep: Add local lock check and update comments
Suggested-by: @kjbracey-arm

Replace the sleep_manager_can_deep_sleep() with !_deep_sleep_locked.
Indeed, if we know we've taken the lock because we're using us_ticker,
no need to do the early wake.

Updated comments accordingly.
2019-09-19 17:29:56 +01:00
Laurent Meunier 5df60b59cd SysTimer should let deep sleep happen
When next SysTimer wake-up is scheduler far enough, always consider
that deep sleep may be entered and program an early wake-up.

So that even if deep sleep is only allowed some time later, it can be
entered. If not doing this, then the deep sleep would be prevented by
SysTimer itself and may not be entered at all.

This has been proved to happen in a simple blinly example.
2019-09-19 17:29:56 +01:00
adbridge 40028c8453 Fix added to unlock AT handler mutex
This is a manual commit to bring the contents of PR11526 across.
The original commit could not be cherry-picked or patched!
2019-09-19 16:37:08 +01:00
Syed Fahimuddin Alavi fe34ed0e05 Bux fix: Context can be cleared using CGDCONT after sim ready state 2019-09-19 16:27:02 +01:00
adbridge 59209d2883 "Update secure binaries for ARM_MUSCA_A1_S (ARMC6)" 2019-09-19 11:54:41 +01:00
adbridge af682ccb1b "Update secure binaries for LPC55S69_S (ARMC6)" 2019-09-19 11:44:35 +01:00
Jaeden Amero dd1f65ebb3 tls: Update to Mbed TLS 2.19.1
Update Mbed TLS to Mbed TLS 2.19.1.
2019-09-19 11:29:03 +01:00
Jaeden Amero c2e7a82723 tls: Update export keys callback to use const
Mbed TLS's export keys callback requires the hello.random (for both
server and client) to be const. Make the callbacks in Mbed OS that use
the key export feature use const to match.
2019-09-19 11:28:44 +01:00
Jarkko Paso d0ef1c1886 Merge commit '396dae52ab4eef15910011432f2c7a4261fc22b7'
* commit '396dae52ab4eef15910011432f2c7a4261fc22b7':
  Squashed 'features/nanostack/sal-stack-nanostack/' changes from 4a19dc4..c473148
2019-09-19 11:27:45 +01:00
Jarkko Paso 4f4dd31e42 Squashed 'features/nanostack/sal-stack-nanostack/' changes from 4a19dc4..c473148
c473148 Merge branch 'release_internal' into release_external
d7ad405 Merge pull request #2179 from ARMmbed/release_internal_merge
668fc82 Merge branch 'master' into release_internal
9458a30 Added crypto library to unit test makefile
ff83e4b Added crypto library include path
4292326 Updated eapol TLS library to use extended version of export keys callback
f8f0762 Corrected authenticator EAP-TLS start retries
00fdf8d Added sending of initial EAPOL-key to original target during bootstrap
313794cf Wi-sun neighbor temporary neigh update
05fa359 added support for EAPOL timing adjustment
cfc3223 RPL parent confirmation process update
c3a2c5c Added limit to BR supplicant entries
21de90d RPL dio handler update
425a04a Fix Slaac Handler for not native IPv6 stack.
5722a4a Wi-sun multicast neighbour and RPL update

git-subtree-dir: features/nanostack/sal-stack-nanostack
git-subtree-split: c4731481674d25a516142d1d89f784fbd5e2d58e
2019-09-19 11:27:01 +01:00
Chun-Chieh Li fce0a3e6da M2351: Add post-binary hook into uvision whitelist
This is necessary for exporting M2351 uvision project.
2019-09-19 11:23:52 +01:00
Chun-Chieh Li 36fa1d0123 M2351: Add pre-built secure image for non-PSA 2019-09-19 11:23:52 +01:00
Chun-Chieh Li 656ee0d7a5 M2351: Enable USB UART for non-PSA secure target for Greentea
NOTE1:  USB UART is partitioned for non-secure world. Secure world still can share
        it with limit that its interrupt cannot use in secure world.
NOTE2:  In secure world, USB UART is only for Greentea and STDIO. Developers shouldn't
        use it for other purposes.
2019-09-19 11:23:52 +01:00
Chun-Chieh Li 2e2a340cec M2351: Support non-PSA secure/non-secure combined build
Support secure/non-secure combined build for non-PSA target:
1.  In secure post-build, deliver built secure image to TARGET_NU_PREBUILD_SECURE
    directory which is to combine later.
2.  In non-secure post-build, merge non-secure image with secure image saved in
    TARGET_NU_PREBUILD_SECURE directory.
3.  In non-secure post-build, user can also drop pre-built secure image saved in
    TARGET_NU_PREBUILD_SECURE directory and provide its own by adding the line below
    in mbed_app.json:
    "target.extra_labels_remove": ["NU_PREBUILD_SECURE"]
2019-09-19 11:23:52 +01:00
Chun-Chieh Li f7c7c73bc2 M2351: Rename non-PSA target name to NU_PFM_M2351_NPSA_S/NS
1.  Create a private target name NU_PFM_M2351_CM which stands for the
    NuMaker-PFM-M2351 board and is to be extended.
2.  NU_PFM_M2351_NPSA_S/NS target names for non-PSA secure/non-secure targets
    respectively.
3.  The original target name NUMAKER_PFM_M2351 is recycled and cannot be used.
    Use NU_PFM_M2351_S/NS for non-PSA secure/non-secure targets instead.

NOTE:   Target name doesn't follow the rule below because online database has
        limit of max 20 chars:

        NUMAKER_PFM_M2351_PSA/NOPSA_S/NS

        Instead, it has the rule:

        NU_PFM_M2351_[NPSA_]S/NS

        NU_PFM_M2351_S/NS for PSA targets. This is to be consistent with current
        PSA target naming. So the resolved target names are:

        NU_PFM_M2351_S          : PSA secure target
        NU_PFM_M2351_NS         : PSA non-secure target
        NU_PFM_M2351_NPSA_S     : Non-PSA secure target
        NU_PFM_M2351_NPSA_NS    : Non-PSA non-secure target
2019-09-19 11:23:52 +01:00
Chun-Chieh Li ab742b05c9 M2351: Remove pre-built non-PSA secure image temporarily
This will add back immediately after target renaming is done.
2019-09-19 11:23:52 +01:00
ccli8 69f020bf3f Remove 'PSA' check from test spec conversion
This is unnecessary because all TZ targets must follow the naming rule: PLATFORM_[NPSA_]S/NS
2019-09-19 11:23:52 +01:00
Chun-Chieh Li 6d8606fe4d Convert TZ target name 'NPSA' to test spec platform name
1.  All TZ targets should have name pattern: PLATFORM_[PSA_/NPSA_]S/NS, where:
    (1) 'PLATFORM' for test spec platform name
    (2) 'PSA/NPSA' for PSA/non-PSA targets. Defaults to PSA target on absent.
    (3) 'S'/'NS' for secure/non-secure targets
2. Secure target may participate in Greentea, so its name is also truncated here.
2019-09-19 11:23:52 +01:00
Maciej Bocianski eb36cfeaa6 fix systick irq handler setup
Remove checking that vectors were copied to RAM as not all targets
have NVIC_RAM_VECTOR_ADDRESS defined as public. Instead always
call NVIC_SetVector unconditionally as old implementation does.
2019-09-19 11:23:52 +01:00
Yogesh Pande ca649efba7 Delaying message id random initialization to later stage.
Random initialization sequence is causing start up issues in multiple platform
when done at construction phase.
The right thing is to delay the random initialization to later stage when the
message id is actually required. This provides system to do all necessary allocation
upfront without causing any random race condition at startup phase.
2019-09-19 11:23:52 +01:00
Martin Kojtal f60e9a8075
Merge pull request #11476 from ARMmbed/release-candidate
Release candidate for mbed-os-5.14.0-rc2
2019-09-13 11:46:49 +02:00
Chun-Chieh Li fa14b0c76a Convert TZ target name to test spec platform name
1.  All TZ targets should have name pattern: PLATFORM_[PSA_]S/NS, where:
    (1) 'PLATFORM' for test spec platform name
    (2) 'PSA' is optional to distinguish PSA/non-PSA targets, especially when
        both PSA/non-PSA targets are supported
    (3) 'S'/'NS' for secure/non-secure targets
2. Secure target may participate in Greentea, so its name is also truncated here.
2019-09-12 17:18:37 +01:00
Hugues Kamba 7f2825f432 minimal-printf: Disable floating point support by default
Mbed OS should not require floating point in its base configuration.
This provides further code size savings out of the box.
2019-09-12 17:18:37 +01:00
George Psimenos 7df8b58e27 Move source files and add Doxygen labels 2019-09-12 17:18:37 +01:00
Jaeden Amero a929a8081a crypto: Update to Mbed Crypto 2.0.0 2019-09-12 17:18:37 +01:00
Jaeden Amero fd67fdf70a tls: Update to Mbed TLS 2.19.0 2019-09-12 17:18:37 +01:00
Mahesh Mahadevan fc13550647 MCUXpresso: Update the MXRT Serial driver for MBED_TICKLESS
We should not block in case the UART is busy transmitting. The
API has been updated to check the status of all UART's and return
1 in case any of them is busy transmitting.

Signed-off-by: Mahesh Mahadevan <mahesh.mahadevan@nxp.com>
2019-09-12 17:18:37 +01:00
Mahesh Mahadevan 71710318f7 MCUXpresso: Change the MXRT deep sleep implementation
The code checks if any of the UART's is still transmitting.
If so then prevent from entering deepsleep

Signed-off-by: Mahesh Mahadevan <mahesh.mahadevan@nxp.com>
2019-09-12 17:18:37 +01:00
Mahesh Mahadevan 0206f48e04 MCUXpresso: Update the Kinetis Serial driver for MBED_TICKLESS
We should not block in case the UART is busy transmitting. The
API has been updated to check the status of all UART's and return
1 in case any of them is busy transmitting.

Signed-off-by: Mahesh Mahadevan <mahesh.mahadevan@nxp.com>
2019-09-12 17:18:37 +01:00
Mahesh Mahadevan de6ce271bf MCUXpresso: Change the Kinetis deep sleep implementation
The code checks if any of the UART's is still transmitting.
If so then prevent from entering deepsleep

Signed-off-by: Mahesh Mahadevan <mahesh.mahadevan@nxp.com>
2019-09-12 17:18:37 +01:00
Veijo Pesonen 575109b22f Adds missing include required by fixed-width format specifiers 2019-09-12 17:18:37 +01:00
Martin Kojtal 068a634f8f nrf52: fix removing additional config - was not there 2019-09-12 17:18:37 +01:00
Martin Kojtal c51d452de9 NRF52: fix config
remove lib config and use target configuration instead. To avoid duplication of symbols, etc.

Fixes #10655
2019-09-12 17:18:37 +01:00
Ryan Morse e0806c5626 Update PDL to latest 1.3 build
Updates to documentation and personalities. No functional code changes.
2019-09-12 17:18:37 +01:00
int_szyk c423602161 AStyle 2019-09-12 17:18:37 +01:00
int_szyk aeb15e9cce Fix problem with low level lp_ticker STM wrapper 2019-09-12 17:18:37 +01:00
Jarkko Paso 6ff00576d2 Mesh API, Wi-SUN: Initialize Wi-SUN settings with values from json 2019-09-12 17:18:37 +01:00
adbridge 4640441900 "Update secure binaries for ARM_MUSCA_A1_S (ARMC6)" 2019-09-06 13:59:08 +01:00
adbridge c488b5ff57 "Update secure binaries for LPC55S69_S (ARMC6)" 2019-09-06 13:18:09 +01:00
adbridge 79c7fa1f9a Update Mbed version block 2019-09-04 10:14:45 +01:00
Martin Kojtal 34109f0f25
Merge pull request #11402 from jeromecoutant/PR_USB_L4
STM32L4 USB device
2019-09-04 09:12:26 +02:00
Anna Bridge c7c48193d4
Merge pull request #11400 from anttiylitokola/dns_cleanup_fix
nsapi_dns: cleanup dns queue when running out or memory
2019-09-03 16:03:07 +01:00
jeromecoutant 55d60f3c25 Add USB support for DISCO_L4R9I 2019-09-03 16:43:05 +02:00
jeromecoutant fb8b503b1c STM32 targets: USBDEVICE support 2019-09-03 14:24:34 +02:00
jeromecoutant 425d63856c STM32L4 USB: remove EndpointAbort support 2019-09-03 14:23:05 +02:00
Antti Yli-Tokola 1708ec2a3f nsapi_dns: cleanup dns queue when running out or memory 2019-09-03 13:56:21 +03:00