Wykres commitów

2222 Commity (develop)

Autor SHA1 Wiadomość Data
Mirko e122764f21 forgot to include this 2023-11-08 22:58:05 +00:00
Mirko 3cb15d7da2 final 2023-11-08 15:14:19 +00:00
Mirko b1d99a2fc2 cleaning ident 2023-11-08 15:04:10 +00:00
Mirko 2d21188cdc first commit 2023-11-08 14:51:19 +00:00
Brian abf354a155 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-29 15:28:16 -04:00
Brian b9a0a49a54 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:15 -04:00
Brian ed8fa62d09 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:49:46 -04:00
nightwalker-87 31c7fc6f8a
Merge pull request #1343 from shysaur/zero-voltage-factor-fix
Do not crash when the STLink chip returns a voltage factor of zero.
2023-10-15 23:04:47 +02:00
Daniele Cattaneo 3387ca5b42 Do not crash when the STLink chip returns a voltage factor of zero. 2023-10-14 17:57:32 +02:00
Brian df7c7d2172 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 19:55:50 -04:00
nightwalker-87 40fbdb4112
Merge pull request #1333 from fliiiix/bugfix/printf-format
Fix printf format to print 0 correctly
2023-09-16 12:35:24 +02:00
nightwalker-87 956d654096
Merge pull request #1332 from stlink-org/testing
Merge branch `testing` into `develop`
2023-09-16 12:34:15 +02:00
nightwalker-87 a0c0216108 Updated behaviour on Reset
Fixes an issue where early breakpoints did not trigger.
(Closes #1198) (Closes #1246) (Closes #1319)
2023-09-14 11:35:35 +02:00
fliiiix 23d52b92ae Prefix all CDB bytes with 0x, including zeros 2023-09-04 18:48:41 +02:00
nightwalker-87 fd8d8e6139
Merge branch 'develop' into testing 2023-09-02 17:35:59 +02:00
nightwalker-87 7475ec7f30 General Project Update
- Updated CHANGELOG.md
- Updated README.md
- Minor fixes & updates in documentation.
2023-09-02 17:18:09 +02:00
nightwalker-87 f3fcaf2553
Merge pull request #1330 from andars/fix-some-stm32l0-flashing-issues
Fixed some flashing issues on STM32L0.
2023-09-01 22:50:35 +02:00
nightwalker-87 99925c687b
Merge pull request #1327 from ArmoredPony/develop
Fixed unknown option -u in st-util.
2023-09-01 22:47:58 +02:00
nightwalker-87 0915ee9dca
Merge pull request #1325 from gollux/install-paths
CMake: Avoid hard-wired /usr/local/share
2023-09-01 22:41:46 +02:00
andrew 1861b8dc9f Fix stm32lx flash loader on STM32L0
STM32L0 chips use loader_code_stm32lx, but this flash loader is built
for armv7-m and uses instructions that are unsupported on STM32L0 (which
have Cortex M0+ cores implementing armv6-m).

In particular, loader_code_stm32lx uses variants of add-immediate that
do not update the condition flags ( `add r0, r0, #4` ). These are 32bit
instructions in armv7-m and are not available in armv6-m.

Enable loader_code_stm32lx to run on both armv6-m and armv7-m by
building for armv6-m, which requires changing the `add` instructions to
`adds` instructions that do update condition flags (which is ok because
the subs updates the condition flags again before the branch).
2023-08-27 13:34:00 -07:00
andrew 2e6cf7d806 Fix use of uninitialized flash_loader_t in stm32l1_write_half_pages
stm32l1_write_half_pages uses a local flash_loader_t that is never
initialized.

This results in stlink_flash_loader_run using uninitialized values for
fl->buf_addr and fl->loader_addr when copying the buffer
and initializing the source register and PC before running the core to
execute the flashloader.

Pass the flash_loader_t from stlink_flashloader_write through to
stm32l1_write_half_pages and use that one instead of an uninitialized
local structure.
2023-08-27 13:33:57 -07:00
ArmoredPony 270efb3535 fixed unknown option -u 2023-08-16 18:05:37 +04:00
Martin Mares 4b69bdd3e9 CMake: Avoid hard-wired /usr/local/share
Instead of defining own CMAKE_INSTALL_SHAREDIR, use existing
CMAKE_INSTALL_FULL_DATADIR.

This way, CMAKE_INSTALL_PREFIX is respected.
2023-08-15 12:45:30 +02:00
nightwalker-87 f7fb0a6caa
Merge pull request #1318 from miaobuao/patch-1
Updated package source link for Arch Linux
2023-07-09 00:44:39 +02:00
nightwalker-87 682ec389b7 [doc] Corrected compiling manual
(Closes #1317)
2023-07-09 00:38:49 +02:00
Meo 457d971a40
Update README.md 2023-07-03 09:59:26 +08:00
nightwalker-87 2f27e8ec98 Fixed chip recovery after reset
(Closes #1260)
2023-06-27 08:24:09 +02:00
nightwalker-87 8fad9be9d0 [refactoring] Clean-up for stlink-lib
- Moved declarations for read/write functions to read_write.h .
- Checked & revised header includes
- Changed some datatypes for write_buffer_to_sram() to avoid explicit
casting.
2023-06-25 15:45:33 +02:00
nightwalker-87 041517bd4a Fixed flashing on STM32G0/G4 dual bank devices
(Closes #1310)
2023-06-25 15:31:13 +02:00
nightwalker-87 101d77bf7e Formatting & style fixes. 2023-06-24 23:55:12 +02:00
nightwalker-87 d4b53b06b6
Merge pull request #1315 from stlink-org/testing
Merge branch `testing` into `develop`
2023-06-19 23:48:26 +02:00
nightwalker-87 b72f5b5acf Fixed compilation on Windows
- [doc] Updated installation instructions
- Fixed cmd bug in mingw64-build.bat
- Fixed cmake building for WIN32
2023-06-12 11:56:21 +02:00
nightwalker-87 2c337615c9 [refactoring] Clean-up for stlink-flash & -info
- Ensure proper function declaration
- Checked & revised header includes
2023-06-11 14:29:23 +02:00
nightwalker-87 5d3f3ec7f4 Set flash_type for STM32H5 devices 2023-06-10 21:37:01 +02:00
nightwalker-87 755c20c08e Replace data types with fixed width typedefs (C99)
- Unified variable type: size_t --> uint32_t
- Removed unnecessary explicit casts
- Minor formatting fixes
2023-06-10 20:07:19 +02:00
nightwalker-87 efc5c3713d Fixed flash-write/verify error
(Closes #1303)
2023-06-09 14:51:57 +02:00
nightwalker-87 fc990648c4 [refactoring] Clean-up for stlink-lib
- Ensure proper function declaration
- Checked & revised header includes
2023-06-09 12:55:25 +02:00
nightwalker-87 be2e7e3883 [refactoring] Clean-up for stlink-lib
- Ensure proper function declaration
- Moved some functions to related modules
- Checked & revised header includes
- Renamed "md5" to "lib_md5"
- New source file "md5"
2023-06-09 01:28:22 +02:00
nightwalker-87 67ae7a12d8 Added comments for testing modules 2023-06-09 01:16:18 +02:00
nightwalker-87 dbe13dedae [doc] Added header comments for lib modules
- common.c/.h
 - sg.c/.h
 - usb.c/.h
2023-06-07 23:12:00 +02:00
nightwalker-87 c8eaebc58e Improvents for library documentation
- Renamed header file reg.h to register.h
- Added unified header comments for files
- [doc] flash_loader.h: // Static functions
2023-06-07 22:44:59 +02:00
nightwalker-87 92ad99fe35 Minor fixes & additions
- G49x_G4Ax & WLEx: Added dualbank support
- G49x_G4Ax: Added option byte support
- Minor formatting improvements
- Replaced leftovers for non-fixed length types
2023-06-07 22:01:56 +02:00
nightwalker-87 5e85fd0639 Replace data types with fixed width typedefs (C99)
- Unified variable types (Closes #909)
short --> int16_t
unsigned short --> uint16_t
int --> int32_t
unsigned int --> uint32_t
long --> int32_t
unsigned long --> uint32_t
long long --> int64_t
unsigned long long --> uint64_t

- Added missing header includes
2023-05-08 02:05:55 +02:00
nightwalker-87 a9c213958e
Merge pull request #1312 from gemesa/fix-broken-links
[doc] Fixed broken links
2023-05-07 19:40:42 +02:00
Andras Gemes 623570e3cc
Renamed 'supported devices.md' to 'supported_devices.md' 2023-05-07 12:39:03 +02:00
Andras Gemes e4b2594b5a
Fixed broken links 2023-05-05 15:41:07 +02:00
nightwalker-87 b1c4de647c Naming convention for header includes 2023-05-03 14:02:26 +02:00
nightwalker-87 5621d541d9 Resorted #defines in stm32flash.h 2023-05-03 13:55:19 +02:00
nightwalker-87 800c8616fb Unified #define names for STM32 devices 2023-04-30 22:32:59 +02:00
nightwalker-87 823187216a st-flash: auto-reset after mass erase 2023-04-30 20:46:37 +02:00