-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable MTS_DRAGONFLY_F411RE to register with Pelion #10287
Conversation
@linlingao, thank you for your changes. |
Let us know once ready. This looks like some fixes can be sent separately (fixing target code) |
@0xc0170 The target code is ready to be merged. Since I needed the SPI changes from @bentcooke, those commits were rolled into this PR. I'm planning to wait for Ben's changes to go in first then rebase. |
What is the PR number (depending PR here) ? |
@linlingao Would you happen to know what'll happen with this PR since #10177 was closed? |
@cmonr I think @bentcooke will either reopen it or refactor the code in another PR. |
@linlingao Mind rebasing? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks fine to me ,one clarification for functionality removal.
Rebased. |
Can you rebase instead of merge ? The commit 849b05a is not needed here |
@0xc0170 @cmonr I rebased. @bentcooke would like to double check with Mutitech to make sure it's okay to remove their bootloader. Please don't merge yet. |
I built the blinky application for the Dragonfly without adding "target.post_binary_hook:null" to mbed_app.json. The size looks like it includes the bootloader but it's not ours. If ours is included, you can enter it by hitting any key, on the debug port, upon reset. That's not working. You can see it work with our AT pass through code found here: ftp://ftp.multitech.com/wireless/MTQ/ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Quite a nice solution! I have a few questions/suggestions below.
if hasattr(self.target, 'post_binary_hook'): | ||
if self.target.post_binary_hook is None: | ||
define_string = self.make_ld_define( | ||
"DISABLE_POST_BINARY_HOOK", 1) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Really neat idea. I want to run a slight tweak by you and see what you think.
Naming the macro DISABLE_POST_BINARY_HOOK
implies that a post binary hook is usually enabled. In general, this isn't the case, only a few targets use post binary hooks. How do you feel about changing this to macro to POST_BINARY_HOOK_ENABLED
? So that would mean if post_binary_hook
is not null, POST_BINARY_HOOK_ENABLED
would be set to 1
, otherwise it'd be set to 0
?
I think this tweak makes the solution a bit more generic and potentially useful for other targets.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The reason I named it "DISABLE_POST_BINARY_HOOK" is because for those targets that have post_binary_hook, they're actually enabled in target.json. When you override it with null (uncommon case), it's becoming a "disable". I think you might come from a different perspective where most targets do not have post_binary_hook, yes?
@felser I didn't change your bootloader. Mbed bootloader is not checked in so there's no way to include it. I'm not aware of any other bootloaders. Is it possible the MTS bootloader in the repo is out of date? |
@bridadan WRT the stack size, I knew I could override it in mbed_app.json. I did it on purpose since the stack size was okay prior to 5.12.2(?) release, but in the latest code, it's no longer enough. I would expect this issue to show up in all applications. |
Sorry, not sure what I did. Must have been "operator error"... our bootloader is working. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approving the PR. Bootloader is working as expected with default settings.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Target override for lwip in targets.json file for specific target to be set
… behalf of Ben C.
…sabled by setting it to null
I have reluctantly increased the tcpip stack just for this board. I think it would be a more proactive approach to increase the stack size for all boards so that we don't have to fix this same issue again and again. Our users tend to panic when they see a fault. Not everyone feels comfortable to go in and override the settings. Oh well, enough said. |
@SeppoTakalo Please review the feedback |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One last question about DISABLE binary hook macro:
@bridadan proposed to have POST_BINARY_HOOK_ENABLED - wouldnt it be better ? set to 0 if not enabled, 1 if enabled. The linker scripts here would use this value.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
After going over it with @linlingao, she made a good argument that this is a lower touch change. My suggestion would add a new macro to every linker script. Generally I don't like the negative macro names (DISABLE_X
) with positive values (1
). But in this case I think its probably fine.
@0xc0170 Is there work needed from my side? Can we merge this PR? |
CI started |
Test run: FAILEDSummary: 1 of 11 test jobs failed Failed test jobs:
|
Restarted exporters |
Description
Enable MTS_DRAGONFLY_F411RE to register with Pelion
Pull request type
Reviewers
Release Notes