Commit Graph

7456 Commits

Author SHA1 Message Date
HiFiPhile 0ab1bffde9
Merge pull request #2315 from kasjer/kasjer/nucleo-g491re
Add BSP for nucleo-g491re
2023-11-13 20:26:49 +01:00
Jerzy Kasenberg c9f09d6079 Add BSP for nucleo-g491re
This adds bsp for ST nucleo-g491re board.
This is mostly copy of nucleo-f474 only differences being:
- PLL configured to 170MHz (not affecting USB which runs on HSI48)
- Linker script freshly generated from STM32CubeIDE (smaller RAM)

Signed-off-by: Jerzy Kasenberg <jerzy.kasenberg@codecoup.pl>
2023-11-13 17:38:19 +01:00
Ha Thach a6b29ae57c
Merge pull request #2314 from jfm92/master
Adding extern C to definitions to allow link on C++ project
2023-11-13 17:50:43 +07:00
jfm92 d4be0fd104 Adding extern C to definitions to allow link on C++ project 2023-11-13 10:14:55 +01:00
Antonio Vázquez Blanco 8bac68db84 Add historical EP compatibility to bth class 2023-11-07 17:38:26 +01:00
Ha Thach f84eafcaa2
Merge pull request #2310 from hathach/fix-usbh-enumeration-removal-race
Fix usbh enumeration removal race
2023-11-03 23:25:03 +07:00
hathach 9377fd6901
fix -Werror=null-dereference warning 2023-11-03 22:34:49 +07:00
hathach 4b9320e40e
fix race condition when dev0 is removed while enumerating 2023-11-03 22:22:13 +07:00
Ha Thach f3eaf0652d
Merge pull request #2293 from Yveaux/master
Add PlatformIO manifest
2023-11-03 09:08:10 +07:00
Yveaux 2f2ccb33ed
Added end of file per ci recommendation 2023-11-02 17:06:16 +01:00
Ha Thach 3af44089bc
Merge pull request #2308 from hathach/add-u5-uid
add unique id for u5, also allow to build with OPT_OS_CUSTOM
2023-11-02 20:56:27 +07:00
hathach 89475fcf26
add unique id for u5, also allow to build with OPT_OS_CUSTOM 2023-11-02 19:32:25 +07:00
Ha Thach b28d121a54
Merge pull request #2307 from hathach/minor-upate-max3421
skip tuh_max3421_spi_cs_api() in hcd_init()
2023-11-02 18:44:46 +07:00
hathach 46106c6ef4
skip tuh_max3421_spi_cs_api() in hcd_init()
only call tuh_max3421_spi_cs_api() in SPI start/end transfer since
Arduino port use this to call begin/endTransaction()
2023-11-02 15:22:02 +07:00
Ha Thach 68faa45c6a
Merge pull request #2302 from HiFiPhile/f4_otg
Add STM32F4 OTG_HS support to BSP
2023-11-02 09:54:34 +07:00
Ha Thach d73d8ecfbe
Merge pull request #2305 from hathach/remove-legacy-st-synopsys-driver
remove legacy driver st/synopsys
2023-11-01 17:12:00 +07:00
hathach 06c9d9a79a
remove legacy driver st/synopsys 2023-11-01 16:36:28 +07:00
Ha Thach 4ee36092e9
Merge pull request #2304 from hathach/update-doc
Update doc & add Adafruit as sponsor in readme
2023-11-01 16:30:16 +07:00
hathach 7c56c05c9a
more readme 2023-11-01 11:51:34 +07:00
hathach 04c12d302e
add target link to adafruit logo 2023-11-01 11:23:01 +07:00
hathach 0ff327f25f
resize logo, add white background 2023-11-01 11:20:18 +07:00
hathach 484937a042
update readme, add sponsor section 2023-11-01 10:40:20 +07:00
HiFiPhile de02748504 Update make 2023-10-31 21:29:07 +01:00
HiFiPhile bf2e54e3d3 Add STM32F4 OTG_FS pin to BSP. 2023-10-31 20:46:55 +01:00
HiFiPhile 86f00f6b49 Fix STM32F7 OTG_HS GPIO alt mapping. 2023-10-31 20:45:06 +01:00
hathach 765ba4b9ac
update doc to add supported mcus 2023-10-31 16:21:45 +07:00
Ha Thach 4c01c5a714
Merge pull request #2300 from hathach/add-u5a5
Add support for stm32u5a5 (highspeed with built-in femtoPHY)
2023-10-31 13:27:54 +07:00
hathach 3e140756dc
update stm32u5xx_hal_driver, fix build with old u575 board 2023-10-31 12:08:45 +07:00
hathach 214a4afa6a
dwc2 flush tx,rx fifo in dcd_init() 2023-10-31 11:53:40 +07:00
hathach 6ab7875aab
uart working on u5a5 2023-10-31 11:39:20 +07:00
hathach db3ff4b352
usb on u5a5 hs work well with correct VBVALEXTOEN/VBVALOVAL set 2023-10-31 11:26:31 +07:00
hathach 9f0223dccd
minor clean up 2023-10-31 10:58:15 +07:00
hathach 305ef5d48a
minor space format dwc2 driver 2023-10-30 22:22:27 +07:00
hathach a4c542a7b4
addd dwc2_info.py/md update stm32u5a5 board clock & power configure, able to get passed otg clock reset 2023-10-30 22:21:58 +07:00
Ha Thach a91b720c2e
Merge pull request #2291 from hathach/minor-update-max3421
minor update for max3421
2023-10-30 11:10:03 +07:00
Brian 490343b4d3 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-29 15:28:27 -04:00
Yveaux ae7ad53949 Add PlatformIO manifest 2023-10-28 14:47:29 +02:00
hathach 9cba9a753b
update s3 devkitm with max3421 pin following metro s3, check max3421 version to make sure it is valid 2023-10-27 17:40:53 +07:00
PanRe 10558acac6
Merge pull request #2289 from HiFiPhile/uac_interl
Update audio_4_channel_mic example for HS device.
2023-10-25 20:31:00 +02:00
HiFiPhile 2d802e03e9 Update audio_4_channel_mic example for HS device. 2023-10-24 22:14:24 +02:00
Brian 3cc82d656e Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:27 -04:00
PanRe a2390802f8
Merge pull request #2282 from HiFiPhile/uac_interl
UAC IN transfer improvements
2023-10-19 19:49:19 +02:00
Brian b8ae3d55d4 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:50:07 -04:00
Mengsk d3fa3cdf48 Adjsut blackout time. 2023-10-18 17:05:35 +02:00
hathach 27a2c8cba4
adding nulceo stm32u5a5, fix clock configure issue
dwc2 core stuck at reset
2023-10-18 18:43:07 +07:00
hathach 5025e80c9e
adding u5a5 nucleo 2023-10-18 15:27:06 +07:00
Ha Thach dd588222c7
Merge pull request #2265 from bencowperthwaite/master
STM32U5 HS Support
2023-10-18 15:25:57 +07:00
HiFiPhile ade8a19aef Put sw_buf in USB section only if necessary. 2023-10-17 21:21:52 +02:00
HiFiPhile e9d894fe66 Fix compile. 2023-10-17 21:03:29 +02:00
Ha Thach 0ede159ad0
Merge pull request #2244 from gabChouin/feat-stm32u575_nucleo
Add stm32u575-nucleo support
2023-10-18 00:06:28 +07:00