Commit Graph

7448 Commits

Author SHA1 Message Date
Ha Thach
f3eaf0652d Merge pull request #2293 from Yveaux/master
Add PlatformIO manifest
2023-11-03 09:08:10 +07:00
Yveaux
2f2ccb33ed Added end of file per ci recommendation 2023-11-02 17:06:16 +01:00
Ha Thach
3af44089bc Merge pull request #2308 from hathach/add-u5-uid
add unique id for u5, also allow to build with OPT_OS_CUSTOM
2023-11-02 20:56:27 +07:00
hathach
89475fcf26 add unique id for u5, also allow to build with OPT_OS_CUSTOM 2023-11-02 19:32:25 +07:00
Ha Thach
b28d121a54 Merge pull request #2307 from hathach/minor-upate-max3421
skip tuh_max3421_spi_cs_api() in hcd_init()
2023-11-02 18:44:46 +07:00
hathach
46106c6ef4 skip tuh_max3421_spi_cs_api() in hcd_init()
only call tuh_max3421_spi_cs_api() in SPI start/end transfer since
Arduino port use this to call begin/endTransaction()
2023-11-02 15:22:02 +07:00
Ha Thach
68faa45c6a Merge pull request #2302 from HiFiPhile/f4_otg
Add STM32F4 OTG_HS support to BSP
2023-11-02 09:54:34 +07:00
Ha Thach
d73d8ecfbe Merge pull request #2305 from hathach/remove-legacy-st-synopsys-driver
remove legacy driver st/synopsys
2023-11-01 17:12:00 +07:00
hathach
06c9d9a79a remove legacy driver st/synopsys 2023-11-01 16:36:28 +07:00
Ha Thach
4ee36092e9 Merge pull request #2304 from hathach/update-doc
Update doc & add Adafruit as sponsor in readme
2023-11-01 16:30:16 +07:00
hathach
7c56c05c9a more readme 2023-11-01 11:51:34 +07:00
hathach
04c12d302e add target link to adafruit logo 2023-11-01 11:23:01 +07:00
hathach
0ff327f25f resize logo, add white background 2023-11-01 11:20:18 +07:00
hathach
484937a042 update readme, add sponsor section 2023-11-01 10:40:20 +07:00
HiFiPhile
de02748504 Update make 2023-10-31 21:29:07 +01:00
HiFiPhile
bf2e54e3d3 Add STM32F4 OTG_FS pin to BSP. 2023-10-31 20:46:55 +01:00
HiFiPhile
86f00f6b49 Fix STM32F7 OTG_HS GPIO alt mapping. 2023-10-31 20:45:06 +01:00
hathach
765ba4b9ac update doc to add supported mcus 2023-10-31 16:21:45 +07:00
Ha Thach
4c01c5a714 Merge pull request #2300 from hathach/add-u5a5
Add support for stm32u5a5 (highspeed with built-in femtoPHY)
2023-10-31 13:27:54 +07:00
hathach
3e140756dc update stm32u5xx_hal_driver, fix build with old u575 board 2023-10-31 12:08:45 +07:00
hathach
214a4afa6a dwc2 flush tx,rx fifo in dcd_init() 2023-10-31 11:53:40 +07:00
hathach
6ab7875aab uart working on u5a5 2023-10-31 11:39:20 +07:00
hathach
db3ff4b352 usb on u5a5 hs work well with correct VBVALEXTOEN/VBVALOVAL set 2023-10-31 11:26:31 +07:00
hathach
9f0223dccd minor clean up 2023-10-31 10:58:15 +07:00
hathach
305ef5d48a minor space format dwc2 driver 2023-10-30 22:22:27 +07:00
hathach
a4c542a7b4 addd dwc2_info.py/md update stm32u5a5 board clock & power configure, able to get passed otg clock reset 2023-10-30 22:21:58 +07:00
Ha Thach
a91b720c2e Merge pull request #2291 from hathach/minor-update-max3421
minor update for max3421
2023-10-30 11:10:03 +07:00
Brian
490343b4d3 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-29 15:28:27 -04:00
Yveaux
ae7ad53949 Add PlatformIO manifest 2023-10-28 14:47:29 +02:00
hathach
9cba9a753b update s3 devkitm with max3421 pin following metro s3, check max3421 version to make sure it is valid 2023-10-27 17:40:53 +07:00
PanRe
10558acac6 Merge pull request #2289 from HiFiPhile/uac_interl
Update audio_4_channel_mic example for HS device.
2023-10-25 20:31:00 +02:00
HiFiPhile
2d802e03e9 Update audio_4_channel_mic example for HS device. 2023-10-24 22:14:24 +02:00
Brian
3cc82d656e Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:27 -04:00
PanRe
a2390802f8 Merge pull request #2282 from HiFiPhile/uac_interl
UAC IN transfer improvements
2023-10-19 19:49:19 +02:00
Brian
b8ae3d55d4 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:50:07 -04:00
Mengsk
d3fa3cdf48 Adjsut blackout time. 2023-10-18 17:05:35 +02:00
hathach
27a2c8cba4 adding nulceo stm32u5a5, fix clock configure issue
dwc2 core stuck at reset
2023-10-18 18:43:07 +07:00
hathach
5025e80c9e adding u5a5 nucleo 2023-10-18 15:27:06 +07:00
Ha Thach
dd588222c7 Merge pull request #2265 from bencowperthwaite/master
STM32U5 HS Support
2023-10-18 15:25:57 +07:00
HiFiPhile
ade8a19aef Put sw_buf in USB section only if necessary. 2023-10-17 21:21:52 +02:00
HiFiPhile
e9d894fe66 Fix compile. 2023-10-17 21:03:29 +02:00
Ha Thach
0ede159ad0 Merge pull request #2244 from gabChouin/feat-stm32u575_nucleo
Add stm32u575-nucleo support
2023-10-18 00:06:28 +07:00
hathach
a5a77af11e add board.mk for u575 nucleo 2023-10-17 23:53:09 +07:00
hathach
22aefd6aba add cmake support for u575 nucleo 2023-10-17 22:48:54 +07:00
Ha Thach
80ee307244 Merge branch 'master' into feat-stm32u575_nucleo 2023-10-17 22:31:33 +07:00
HiFiPhile
d83a210788 Add blackout time. 2023-10-17 15:18:05 +02:00
HiFiPhile
0a1d6cf4d0 Read sample rate directly from control transfer to eliminate callback. 2023-10-17 13:06:55 +02:00
HiFiPhile
656e1e416a Add flow control for IN transfer. 2023-10-17 09:46:01 +02:00
Brian
d6acbd0ea5 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 19:59:23 -04:00
PanRe
118823c254 Merge pull request #2259 from HiFiPhile/uac_interl
Fix UAC encoding, update example.
2023-10-11 19:18:35 +02:00