Wykres commitów

2131 Commity (81575cb2d9fd1db32dd12581baf642447e5ab623)

Autor SHA1 Wiadomość Data
nightwalker-87 81575cb2d9 [doc] Updated udev directory (#1358) 2023-12-23 17:45:17 +01:00
nightwalker-87 8f2b289f20 Info on HW breakpoints for external bus
- [doc] Updated tutorial.md (Closes #1219)
- Moved memory maps into separate file.
2023-11-27 23:41:27 +01:00
nightwalker-87 ba335a47ab STM32F76xxx: Added flashing in dual bank mode
(Closes #1174)
2023-11-27 22:00:27 +01:00
nightwalker-87 4637b1497b Merge branch 'develop' into testing 2023-11-24 20:38:03 +01:00
nightwalker-87 3efa7932fb Fixed memory allocation for stlink-gui
(Closes #1356)
2023-11-24 20:22:50 +01:00
nightwalker-87 7dcb1302d8 Fixes for STM32H7 & STM32G0B1 devices
- Fixed flash lock for STM32H7 dual bank devices
- Fixed flash erase issue on STM32G0B1 (Closes #1321)
2023-11-24 18:21:31 +01:00
nightwalker-87 509d60efe4
Merge pull request #1355 from marcelobarrosufu/develop
Fixed support for STM32U5 chips.
2023-11-23 20:16:22 +01:00
nightwalker-87 ed558c9ac7
Merge branch 'develop' into develop 2023-11-23 20:12:57 +01:00
nightwalker-87 e212349460
Merge pull request #1354 from rcubee/c0
Added support for STM32C0x1.
2023-11-23 20:10:31 +01:00
nightwalker-87 fb141d40d7
Merge pull request #1353 from mirkomatonti/mirko-otp_read_write
First Implementation of the OTP Read/Write function
2023-11-23 20:08:15 +01:00
Mirko Matonti 033007fd27 pr adjustment 2023-11-23 17:46:09 +00:00
nightwalker-87 0d16dbac9a CodeQL Workflow Maintenance
- Removed incompatible workflow
- Updated existing workflow
2023-11-22 01:13:44 +01:00
nightwalker-87 3e18d9d3b7
Merge pull request #1349 from IVOES/develop
Add CodeQL Workflow for Code Security Analysis
2023-11-15 23:43:10 +01:00
rcubee cf840b5f3d fixed formatting 2023-11-14 17:38:12 +01:00
rcubee 3fd7140524 forgot to include these 2023-11-14 17:30:00 +01:00
Marcelo Barros de Almeida 5df53adb2c Missing swo and dualback flags in U6 chip models 2023-11-14 07:39:56 -03:00
Marcelo Barros de Almeida e286f243ef Fixing support for U5 chips (original U5x5.chip was not handling all U5 chips ) 2023-11-14 00:27:19 -03:00
rcubee 4a7b8cdb26 removed the patch file itself 2023-11-11 18:19:04 +01:00
rcubee eb083ae753 removed redundant lines 2023-11-11 17:40:28 +01:00
rcubee 99a2be4d28 initial commit 2023-11-11 17:27:05 +01:00
Mirko e122764f21 forgot to include this 2023-11-08 22:58:05 +00:00
Mirko 3cb15d7da2 final 2023-11-08 15:14:19 +00:00
Mirko b1d99a2fc2 cleaning ident 2023-11-08 15:04:10 +00:00
Mirko 2d21188cdc first commit 2023-11-08 14:51:19 +00:00
Brian abf354a155 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-29 15:28:16 -04:00
Brian b9a0a49a54 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:15 -04:00
Brian ed8fa62d09 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:49:46 -04:00
nightwalker-87 31c7fc6f8a
Merge pull request #1343 from shysaur/zero-voltage-factor-fix
Do not crash when the STLink chip returns a voltage factor of zero.
2023-10-15 23:04:47 +02:00
Daniele Cattaneo 3387ca5b42 Do not crash when the STLink chip returns a voltage factor of zero. 2023-10-14 17:57:32 +02:00
Brian df7c7d2172 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 19:55:50 -04:00
nightwalker-87 40fbdb4112
Merge pull request #1333 from fliiiix/bugfix/printf-format
Fix printf format to print 0 correctly
2023-09-16 12:35:24 +02:00
nightwalker-87 956d654096
Merge pull request #1332 from stlink-org/testing
Merge branch `testing` into `develop`
2023-09-16 12:34:15 +02:00
nightwalker-87 a0c0216108 Updated behaviour on Reset
Fixes an issue where early breakpoints did not trigger.
(Closes #1198) (Closes #1246) (Closes #1319)
2023-09-14 11:35:35 +02:00
fliiiix 23d52b92ae Prefix all CDB bytes with 0x, including zeros 2023-09-04 18:48:41 +02:00
nightwalker-87 fd8d8e6139
Merge branch 'develop' into testing 2023-09-02 17:35:59 +02:00
nightwalker-87 7475ec7f30 General Project Update
- Updated CHANGELOG.md
- Updated README.md
- Minor fixes & updates in documentation.
2023-09-02 17:18:09 +02:00
nightwalker-87 f3fcaf2553
Merge pull request #1330 from andars/fix-some-stm32l0-flashing-issues
Fixed some flashing issues on STM32L0.
2023-09-01 22:50:35 +02:00
nightwalker-87 99925c687b
Merge pull request #1327 from ArmoredPony/develop
Fixed unknown option -u in st-util.
2023-09-01 22:47:58 +02:00
nightwalker-87 0915ee9dca
Merge pull request #1325 from gollux/install-paths
CMake: Avoid hard-wired /usr/local/share
2023-09-01 22:41:46 +02:00
andrew 1861b8dc9f Fix stm32lx flash loader on STM32L0
STM32L0 chips use loader_code_stm32lx, but this flash loader is built
for armv7-m and uses instructions that are unsupported on STM32L0 (which
have Cortex M0+ cores implementing armv6-m).

In particular, loader_code_stm32lx uses variants of add-immediate that
do not update the condition flags ( `add r0, r0, #4` ). These are 32bit
instructions in armv7-m and are not available in armv6-m.

Enable loader_code_stm32lx to run on both armv6-m and armv7-m by
building for armv6-m, which requires changing the `add` instructions to
`adds` instructions that do update condition flags (which is ok because
the subs updates the condition flags again before the branch).
2023-08-27 13:34:00 -07:00
andrew 2e6cf7d806 Fix use of uninitialized flash_loader_t in stm32l1_write_half_pages
stm32l1_write_half_pages uses a local flash_loader_t that is never
initialized.

This results in stlink_flash_loader_run using uninitialized values for
fl->buf_addr and fl->loader_addr when copying the buffer
and initializing the source register and PC before running the core to
execute the flashloader.

Pass the flash_loader_t from stlink_flashloader_write through to
stm32l1_write_half_pages and use that one instead of an uninitialized
local structure.
2023-08-27 13:33:57 -07:00
ArmoredPony 270efb3535 fixed unknown option -u 2023-08-16 18:05:37 +04:00
Martin Mares 4b69bdd3e9 CMake: Avoid hard-wired /usr/local/share
Instead of defining own CMAKE_INSTALL_SHAREDIR, use existing
CMAKE_INSTALL_FULL_DATADIR.

This way, CMAKE_INSTALL_PREFIX is respected.
2023-08-15 12:45:30 +02:00
nightwalker-87 f7fb0a6caa
Merge pull request #1318 from miaobuao/patch-1
Updated package source link for Arch Linux
2023-07-09 00:44:39 +02:00
nightwalker-87 682ec389b7 [doc] Corrected compiling manual
(Closes #1317)
2023-07-09 00:38:49 +02:00
Meo 457d971a40
Update README.md 2023-07-03 09:59:26 +08:00
nightwalker-87 2f27e8ec98 Fixed chip recovery after reset
(Closes #1260)
2023-06-27 08:24:09 +02:00
nightwalker-87 8fad9be9d0 [refactoring] Clean-up for stlink-lib
- Moved declarations for read/write functions to read_write.h .
- Checked & revised header includes
- Changed some datatypes for write_buffer_to_sram() to avoid explicit
casting.
2023-06-25 15:45:33 +02:00
nightwalker-87 041517bd4a Fixed flashing on STM32G0/G4 dual bank devices
(Closes #1310)
2023-06-25 15:31:13 +02:00
nightwalker-87 101d77bf7e Formatting & style fixes. 2023-06-24 23:55:12 +02:00